rfc9623.original | rfc9623.txt | |||
---|---|---|---|---|
TAPS Working Group A. Brunstrom, Ed. | Internet Engineering Task Force (IETF) A. Brunstrom, Ed. | |||
Internet-Draft Karlstad University | Request for Comments: 9623 Karlstad University | |||
Intended status: Informational T. Pauly, Ed. | Category: Informational T. Pauly, Ed. | |||
Expires: 16 June 2024 Apple Inc. | ISSN: 2070-1721 Apple Inc. | |||
R. Enghardt | R. Enghardt | |||
Netflix | Netflix | |||
P. Tiesel | P.S. Tiesel | |||
SAP SE | SAP SE | |||
M. Welzl | M. Welzl | |||
University of Oslo | University of Oslo | |||
14 December 2023 | November 2024 | |||
Implementing Interfaces to Transport Services | Implementing Interfaces to Transport Services | |||
draft-ietf-taps-impl-18 | ||||
Abstract | Abstract | |||
The Transport Services system enables applications to use transport | The Transport Services system enables applications to use transport | |||
protocols flexibly for network communication and defines a protocol- | protocols flexibly for network communication and defines a protocol- | |||
independent Transport Services Application Programming Interface | independent Transport Services Application Programming Interface | |||
(API) that is based on an asynchronous, event-driven interaction | (API) that is based on an asynchronous, event-driven interaction | |||
pattern. This document serves as a guide to implementing such a | pattern. This document serves as a guide to implementing such a | |||
system. | system. | |||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This document is not an Internet Standards Track specification; it is | |||
provisions of BCP 78 and BCP 79. | published for informational purposes. | |||
Internet-Drafts are working documents of the Internet Engineering | ||||
Task Force (IETF). Note that other groups may also distribute | ||||
working documents as Internet-Drafts. The list of current Internet- | ||||
Drafts is at https://datatracker.ietf.org/drafts/current/. | ||||
Internet-Drafts are draft documents valid for a maximum of six months | This document is a product of the Internet Engineering Task Force | |||
and may be updated, replaced, or obsoleted by other documents at any | (IETF). It represents the consensus of the IETF community. It has | |||
time. It is inappropriate to use Internet-Drafts as reference | received public review and has been approved for publication by the | |||
material or to cite them other than as "work in progress." | Internet Engineering Steering Group (IESG). Not all documents | |||
approved by the IESG are candidates for any level of Internet | ||||
Standard; see Section 2 of RFC 7841. | ||||
This Internet-Draft will expire on 16 June 2024. | Information about the current status of this document, any errata, | |||
and how to provide feedback on it may be obtained at | ||||
https://www.rfc-editor.org/info/rfc9623. | ||||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2023 IETF Trust and the persons identified as the | Copyright (c) 2024 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents (https://trustee.ietf.org/ | Provisions Relating to IETF Documents | |||
license-info) in effect on the date of publication of this document. | (https://trustee.ietf.org/license-info) in effect on the date of | |||
Please review these documents carefully, as they describe your rights | publication of this document. Please review these documents | |||
and restrictions with respect to this document. Code Components | carefully, as they describe your rights and restrictions with respect | |||
extracted from this document must include Revised BSD License text as | to this document. Code Components extracted from this document must | |||
described in Section 4.e of the Trust Legal Provisions and are | include Revised BSD License text as described in Section 4.e of the | |||
provided without warranty as described in the Revised BSD License. | Trust Legal Provisions and are provided without warranty as described | |||
in the Revised BSD License. | ||||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction | |||
2. Implementing Connection Objects . . . . . . . . . . . . . . . 4 | 2. Implementing Connection Objects | |||
3. Implementing Pre-Establishment . . . . . . . . . . . . . . . 5 | 3. Implementing Preestablishment | |||
3.1. Configuration-time errors . . . . . . . . . . . . . . . . 5 | 3.1. Configuration-Time Errors | |||
3.2. Role of system policy . . . . . . . . . . . . . . . . . . 6 | 3.2. Role of System Policy | |||
4. Implementing Connection Establishment . . . . . . . . . . . . 7 | 4. Implementing Connection Establishment | |||
4.1. Structuring Candidates as a Tree . . . . . . . . . . . . 9 | 4.1. Structuring Candidates as a Tree | |||
4.1.1. Branch Types . . . . . . . . . . . . . . . . . . . . 10 | 4.1.1. Branch Types | |||
4.1.2. Branching Order-of-Operations . . . . . . . . . . . . 13 | 4.1.2. Branching Order-of-Operations | |||
4.1.3. Sorting Branches . . . . . . . . . . . . . . . . . . 14 | 4.1.3. Sorting Branches | |||
4.2. Candidate Gathering . . . . . . . . . . . . . . . . . . . 16 | 4.2. Candidate Gathering | |||
4.2.1. Gathering Endpoint Candidates . . . . . . . . . . . . 16 | 4.2.1. Gathering Endpoint Candidates | |||
4.3. Candidate Racing . . . . . . . . . . . . . . . . . . . . 17 | 4.3. Candidate Racing | |||
4.3.1. Simultaneous . . . . . . . . . . . . . . . . . . . . 18 | 4.3.1. Simultaneous | |||
4.3.2. Staggered . . . . . . . . . . . . . . . . . . . . . . 18 | 4.3.2. Staggered | |||
4.3.3. Failover . . . . . . . . . . . . . . . . . . . . . . 19 | 4.3.3. Failover | |||
4.4. Completing Establishment . . . . . . . . . . . . . . . . 19 | 4.4. Completing Establishment | |||
4.4.1. Determining Successful Establishment . . . . . . . . 20 | 4.4.1. Determining Successful Establishment | |||
4.5. Establishing multiplexed connections . . . . . . . . . . 21 | 4.5. Establishing Multiplexed Connections | |||
4.6. Handling connectionless protocols . . . . . . . . . . . . 22 | 4.6. Handling Connectionless Protocols | |||
4.7. Implementing Listeners . . . . . . . . . . . . . . . . . 22 | 4.7. Implementing Listeners | |||
4.7.1. Implementing Listeners for Connected Protocols . . . 22 | 4.7.1. Implementing Listeners for Connected Protocols | |||
4.7.2. Implementing Listeners for Connectionless | 4.7.2. Implementing Listeners for Connectionless Protocols | |||
Protocols . . . . . . . . . . . . . . . . . . . . . . 23 | 4.7.3. Implementing Listeners for Multiplexed Protocols | |||
4.7.3. Implementing Listeners for Multiplexed Protocols . . 23 | 5. Implementing Sending and Receiving Data | |||
5. Implementing Sending and Receiving Data . . . . . . . . . . . 23 | 5.1. Sending Messages | |||
5.1. Sending Messages . . . . . . . . . . . . . . . . . . . . 24 | 5.1.1. Message Properties | |||
5.1.1. Message Properties . . . . . . . . . . . . . . . . . 24 | 5.1.2. Send Completion | |||
5.1.2. Send Completion . . . . . . . . . . . . . . . . . . . 26 | 5.1.3. Batching Sends | |||
5.1.3. Batching Sends . . . . . . . . . . . . . . . . . . . 26 | 5.2. Receiving Messages | |||
5.2. Receiving Messages . . . . . . . . . . . . . . . . . . . 26 | 5.3. Handling of Data for Fast-Open Protocols | |||
5.3. Handling of data for fast-open protocols . . . . . . . . 27 | 6. Implementing Message Framers | |||
6. Implementing Message Framers . . . . . . . . . . . . . . . . 28 | 6.1. Defining Message Framers | |||
6.1. Defining Message Framers . . . . . . . . . . . . . . . . 29 | 6.2. Sender-Side Message Framing | |||
6.2. Sender-side Message Framing . . . . . . . . . . . . . . . 30 | 6.3. Receiver-Side Message Framing | |||
6.3. Receiver-side Message Framing . . . . . . . . . . . . . . 31 | 7. Implementing Connection Management | |||
7. Implementing Connection Management . . . . . . . . . . . . . 32 | 7.1. Pooled Connection | |||
7.1. Pooled Connection . . . . . . . . . . . . . . . . . . . . 33 | 7.2. Handling Path Changes | |||
7.2. Handling Path Changes . . . . . . . . . . . . . . . . . . 33 | 8. Implementing Connection Termination | |||
8. Implementing Connection Termination . . . . . . . . . . . . . 35 | 9. Cached State | |||
9. Cached State . . . . . . . . . . . . . . . . . . . . . . . . 35 | 9.1. Protocol State Caches | |||
9.1. Protocol state caches . . . . . . . . . . . . . . . . . . 35 | 9.2. Performance Caches | |||
9.2. Performance caches . . . . . . . . . . . . . . . . . . . 36 | 10. Specific Transport Protocol Considerations | |||
10. Specific Transport Protocol Considerations . . . . . . . . . 37 | 10.1. TCP | |||
10.1. TCP . . . . . . . . . . . . . . . . . . . . . . . . . . 38 | 10.2. MPTCP | |||
10.2. MPTCP . . . . . . . . . . . . . . . . . . . . . . . . . 40 | 10.3. UDP | |||
10.3. UDP . . . . . . . . . . . . . . . . . . . . . . . . . . 40 | 10.4. UDP-Lite | |||
10.4. UDP-Lite . . . . . . . . . . . . . . . . . . . . . . . . 42 | 10.5. UDP Multicast Receive | |||
10.5. UDP Multicast Receive . . . . . . . . . . . . . . . . . 42 | 10.6. SCTP | |||
10.6. SCTP . . . . . . . . . . . . . . . . . . . . . . . . . . 44 | 11. IANA Considerations | |||
11. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 46 | 12. Security Considerations | |||
12. Security Considerations . . . . . . . . . . . . . . . . . . . 46 | 12.1. Considerations for Candidate Gathering | |||
12.1. Considerations for Candidate Gathering . . . . . . . . . 47 | 12.2. Considerations for Candidate Racing | |||
12.2. Considerations for Candidate Racing . . . . . . . . . . 47 | 13. References | |||
13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 47 | 13.1. Normative References | |||
14. References . . . . . . . . . . . . . . . . . . . . . . . . . 48 | 13.2. Informative References | |||
14.1. Normative References . . . . . . . . . . . . . . . . . . 48 | Appendix A. API Mapping Template | |||
14.2. Informative References . . . . . . . . . . . . . . . . . 49 | Appendix B. Reasons for Errors | |||
Appendix A. API Mapping Template . . . . . . . . . . . . . . . . 51 | Appendix C. Existing Implementations | |||
Appendix B. Reasons for errors . . . . . . . . . . . . . . . . . 52 | Acknowledgements | |||
Appendix C. Existing Implementations . . . . . . . . . . . . . . 53 | Authors' Addresses | |||
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 54 | ||||
1. Introduction | 1. Introduction | |||
The Transport Services architecture [I-D.ietf-taps-arch] defines a | The Transport Services architecture [RFC9621] defines a system that | |||
system that allows applications to flexibly use transport networking | allows applications to flexibly use transport networking protocols. | |||
protocols. The API that such a system exposes to applications is | The API that such a system exposes to applications is defined as the | |||
defined as the Transport Services API [I-D.ietf-taps-interface]. | Transport Services API [RFC9622]. This API is designed to be generic | |||
This API is designed to be generic across multiple transport | across multiple transport protocols and sets of protocol features. | |||
protocols and sets of protocol features. | ||||
This document serves as a guide to implementing a system that | This document serves as a guide to implementing a system that | |||
provides a Transport Services API. This guide offers suggestions to | provides a Transport Services API. This guide offers suggestions to | |||
developers, but it is not prescriptive: implementations are free to | developers, but it is not prescriptive: implementations are free to | |||
take any desired form as long as the API specification in | take any desired form as long as the API specification defined in | |||
[I-D.ietf-taps-interface] is honored. It is the job of an | [RFC9622] is honored. It is the job of an implementation of a | |||
implementation of a Transport Services system to turn the requests of | Transport Services system to turn the requests of an application into | |||
an application into decisions on how to establish connections, and | decisions on how to establish connections and how to transfer data | |||
how to transfer data over those connections once established. The | over those connections once established. The terminology used in | |||
terminology used in this document is based on the Transport Services | this document is based on the terminology defined in the Transport | |||
architecture [I-D.ietf-taps-arch]. | Services architecture [RFC9621]. | |||
2. Implementing Connection Objects | 2. Implementing Connection Objects | |||
The connection objects that are exposed to applications for Transport | The Connection objects that are exposed to applications for Transport | |||
Services are: | Services are: | |||
* the Preconnection, the bundle of properties that describes the | * the Preconnection, the bundle of properties that describes the | |||
application constraints on, and preferences for, the transport; | application constraints on, and preferences for, the transport; | |||
* the Connection, the basic object that represents a flow of data as | * the Connection, the basic object that represents a flow of data as | |||
Messages in either direction between the Local and Remote | Messages in either direction between the Local and Remote | |||
Endpoints; | Endpoints; | |||
* and the Listener, a passive waiting object that delivers new | * and the Listener, a passive waiting object that delivers new | |||
Connections. | Connections. | |||
Preconnection objects should be implemented as bundles of properties | Preconnection objects should be implemented as bundles of properties | |||
that an application can both read and write. A Preconnection object | that an application can both read and write. A Preconnection object | |||
influences a Connection only at one point in time: when the | influences a Connection only at one point in time: when the | |||
Connection is created. Connection objects represent the interface | Connection is created. Connection objects represent the interface | |||
between the application and the implementation to manage transport | between the application and the implementation to manage transport | |||
state, and conduct data transfer. During the process of | state and conduct data transfer. During the process of establishment | |||
establishment (Section 4), the Connection will not necessarily be | (Section 4), the Connection will not necessarily be immediately bound | |||
immediately bound to a transport protocol instance, since multiple | to a transport protocol instance, since multiple candidate Protocol | |||
candidate Protocol Stacks might be raced. | Stacks might be raced. | |||
Once a Preconnection has been used to create an outbound Connection | Once a Preconnection has been used to create an outbound Connection | |||
or a Listener, the implementation should ensure that the copy of the | or a Listener, the implementation should ensure that the copy of the | |||
properties held by the Connection or Listener cannot be mutated by | properties held by the Connection or Listener cannot be mutated by | |||
the application making changes to the original Preconnection object. | the application making changes to the original Preconnection object. | |||
This may involve the implementation performing a deep-copy, copying | This may involve the implementation performing a deep-copy, copying | |||
the object with all the objects that it references. | the object with all the objects that it references. | |||
Once the Connection is established, the Transport Services | Once the Connection is established, the Transport Services | |||
Implementation maps actions and events to the details of the chosen | Implementation maps actions and events to the details of the chosen | |||
Protocol Stack. For example, the same Connection object may | Protocol Stack. For example, the same Connection object may | |||
ultimately represent a single transport protocol instance (e.g., a | ultimately represent a single transport protocol instance (e.g., a | |||
TCP connection, a TLS session over TCP, a UDP flow with fully- | TCP connection, a TLS session over TCP, a UDP flow with fully | |||
specified Local and Remote Endpoint Identifiers, a DTLS session, a | specified Local and Remote Endpoint Identifiers, a DTLS session, an | |||
SCTP stream, a QUIC stream, or an HTTP/2 stream). The Connection | Stream Control Transmission Protocol (SCTP) stream, a QUIC stream, or | |||
Properties held by a Connection or Listener are independent of other | an HTTP/2 stream). The Connection Properties held by a Connection or | |||
Connections that are not part of the same Connection Group. | Listener are independent of other Connections that are not part of | |||
the same Connection Group. | ||||
Connection establishment is only a local operation for a | Connection establishment is only a local operation for connectionless | |||
connectionless protocols, which serves to simplify the local send/ | protocols, which serves to simplify the local send/receive functions | |||
receive functions and to filter the traffic for the specified | and to filter the traffic for the specified addresses and ports | |||
addresses and ports [RFC8085] (for example using UDP or UDP-Lite | [RFC8085] (for example, using UDP or UDP-Lite transport without a | |||
transport without a connection handshake procedure). | connection handshake procedure). | |||
Once Initiate has been called, the Selection Properties and Endpoint | Once Initiate has been called, the Selection Properties and Endpoint | |||
information of the created Connection are immutable (i.e, an | information of the created Connection are immutable (i.e., an | |||
application is not able to later modify the properties of a | application is not able to later modify the properties of a | |||
Connection by manipulating the original Preconnection object). | Connection by manipulating the original Preconnection object). | |||
Listener objects are created with a Preconnection, at which point | Listener objects are created with a Preconnection, at which point | |||
their configuration should be considered immutable by the | their configuration should be considered immutable by the | |||
implementation. The process of listening is described in | implementation. The process of listening is described in | |||
Section 4.7. | Section 4.7. | |||
3. Implementing Pre-Establishment | 3. Implementing Preestablishment | |||
The pre-establishment phase allows applications to specify properties | The preestablishment phase allows applications to specify properties | |||
for the Connections that they are about to make, or to query the API | for the Connections that they are about to make or to query the API | |||
about potential Connections they could make. | about potential Connections they could make. | |||
During pre-establishment the application specifies one or more | During preestablishment, the application specifies one or more | |||
Endpoints to be used for communication as well as protocol | Endpoints to be used for communication as well as protocol | |||
preferences and constraints via Selection Properties and, if desired, | preferences and constraints via Selection Properties and, if desired, | |||
also Connection Properties. Section 4 of [I-D.ietf-taps-interface] | also Connection Properties. Section 4 of [RFC9622] states that | |||
states that Connection Properties should preferably be configured | Connection Properties should preferably be configured during | |||
during pre-establishment, because they can serve as input to | preestablishment because they can serve as input to decisions that | |||
decisions that are made by the implementation (e.g., the capacity | are made by the implementation (e.g., the capacity profile can guide | |||
profile can guide usage of a protocol offering scavenger-type | usage of a protocol offering scavenger-type congestion control). | |||
congestion control). | ||||
The implementation stores these properties as a part of the | The implementation stores these properties as a part of the | |||
Preconnection object for use during connection establishment. For | Preconnection object for use during connection establishment. For | |||
Selection Properties that are not provided by the application, the | Selection Properties that are not provided by the application, the | |||
implementation uses the default values specified in the Transport | implementation uses the default values specified in the Transport | |||
Services API ([I-D.ietf-taps-interface]). | Services API ([RFC9622]). | |||
3.1. Configuration-time errors | 3.1. Configuration-Time Errors | |||
The Transport Services system should have a list of supported | The Transport Services system should have a list of supported | |||
protocols available, which each have transport features reflecting | protocols available, each of which have transport features reflecting | |||
the capabilities of the protocol. Once an application specifies its | the capabilities of the protocol. Once an application specifies its | |||
Transport Properties, the Transport Services system matches the | Transport Properties, the Transport Services system matches the | |||
required and prohibited properties against the transport features of | required and prohibited properties against the transport features of | |||
the available protocols (see Section 6.2 of [I-D.ietf-taps-interface] | the available protocols (see Section 6.2 of [RFC9622] for the | |||
for the definition of property preferences). | definition of property preferences). | |||
In the following cases, failure should be detected during pre- | In the following cases, failure should be detected during | |||
establishment: | preestablishment: | |||
* A request by an application for properties that cannot be | * A request by an application for properties that cannot be | |||
satisfied by any of the available protocols. For example, if an | satisfied by any of the available protocols. For example, if an | |||
application requires perMsgReliability, but no such feature is | application requires perMsgReliability, but no such feature is | |||
available in any protocol on the host running the Transport | available in any protocol on the host running the Transport | |||
Services system this should result in an error. | Services system, this should result in an error. | |||
* A request by an application for properties that are in conflict | * A request by an application for properties that are in conflict | |||
with each other, such as specifying required and prohibited | with each other, such as specifying required and prohibited | |||
properties that cannot be satisfied by any protocol. For example, | properties that cannot be satisfied by any protocol. For example, | |||
if an application prohibits reliability but then requires | if an application prohibits reliability but then requires | |||
perMsgReliability, this mismatch should result in an error. | perMsgReliability, this mismatch should result in an error. | |||
To avoid allocating resources that are not finally needed, it is | To avoid allocating resources that are not finally needed, it is | |||
important that configuration-time errors fail as early as possible. | important that configuration-time errors fail as early as possible. | |||
3.2. Role of system policy | 3.2. Role of System Policy | |||
The properties specified during pre-establishment have a close | The properties specified during preestablishment have a close | |||
relationship to system policy. The implementation is responsible for | relationship to system policy. The implementation is responsible for | |||
combining and reconciling several different sources of preferences | combining and reconciling several different sources of preferences | |||
when establishing Connections. These include, but are not limited | when establishing Connections. These include, but are not limited | |||
to: | to: | |||
1. Application preferences, i.e., preferences specified during the | 1. Application preferences, i.e., preferences specified during | |||
pre-establishment via Selection Properties. | preestablishment via Selection Properties. | |||
2. Dynamic system policy, i.e., policy compiled from internally and | 2. Dynamic system policy, i.e., policy compiled from internally and | |||
externally acquired information about available network | externally acquired information about available network | |||
interfaces, supported transport protocols, and current/previous | interfaces, supported transport protocols, and current/previous | |||
Connections. Examples of ways to externally retrieve policy- | Connections. Examples of ways to externally retrieve policy- | |||
support information are through OS-specific statistics/ | support information are through OS-specific statistics/ | |||
measurement tools and tools that reside on middleboxes and | measurement tools and tools that reside on middleboxes and | |||
routers. | routers. | |||
3. Default implementation policy, i.e., predefined policy by OS or | 3. Default implementation policy, i.e., predefined policy by the OS | |||
application. | or application. | |||
In general, any protocol or path used for a Connection must conform | In general, any protocol or path used for a Connection must conform | |||
to all three sources of constraints. A violation that occurs at any | to all three sources of constraints. A violation that occurs at any | |||
of the policy layers should cause a protocol or path to be considered | of the policy layers should cause a protocol or path to be considered | |||
ineligible for use. If such a violation prevents a Connection from | ineligible for use. If such a violation prevents a Connection from | |||
being established, this should be communicated to the application, | being established, this should be communicated to the application, | |||
e.g. via the EstablishmentError event. For an example of application | e.g., via the EstablishmentError event. For an example of | |||
preferences leading to constraints, an application may prohibit the | application preferences leading to constraints, an application may | |||
use of metered network interfaces for a given Connection to avoid | prohibit the use of metered network interfaces for a given Connection | |||
user cost. Similarly, the system policy at a given time may prohibit | to avoid user cost. Similarly, the system policy at a given time may | |||
the use of such a metered network interface from the application's | prohibit the use of such a metered network interface from the | |||
process. Lastly, the implementation itself may default to | application's process. Lastly, the implementation itself may default | |||
disallowing certain network interfaces unless explicitly requested by | to disallowing certain network interfaces unless explicitly requested | |||
the application. | by the application. | |||
It is expected that the database of system policies and the method of | It is expected that the database of system policies and the method of | |||
looking up these policies will vary across various platforms. An | looking up these policies will vary across various platforms. An | |||
implementation should attempt to look up the relevant policies for | implementation should attempt to look up the relevant policies for | |||
the system in a dynamic way to make sure it is reflecting an accurate | the system in a dynamic way to make sure it reflects an accurate | |||
version of the system policy, since the system's policy regarding the | version of the system policy, since the system's policy regarding the | |||
application's traffic may change over time due to user or | application's traffic may change over time due to user or | |||
administrative changes. | administrative changes. | |||
4. Implementing Connection Establishment | 4. Implementing Connection Establishment | |||
The process of establishing a network connection begins when an | The process of establishing a network connection begins when an | |||
application expresses intent to communicate with a Remote Endpoint by | application expresses intent to communicate with a Remote Endpoint by | |||
calling Initiate, at which point the Preconnection object contains | calling Initiate, at which point the Preconnection object contains | |||
all constraints or requirements the application has configured. The | all constraints or requirements the application has configured. The | |||
establishment process can be considered complete once there is at | establishment process can be considered complete once there is at | |||
least one Protocol Stack that has completed any required setup to the | least one Protocol Stack that has completed any required setup to the | |||
point that it can transmit and receive the application's data. | point that it can transmit and receive the application's data. | |||
Connection establishment is divided into two top-level steps: | Connection establishment is divided into two top-level steps: | |||
Candidate Gathering (defined in Section 4.2.1 of | ||||
[I-D.ietf-taps-arch]), to identify the paths, protocols, and | * Candidate Gathering (defined in Section 4.2.1 of [RFC9621]) to | |||
endpoints to use (see Section 4.2); and Candidate Racing (defined in | identify the paths, protocols, and endpoints to use (see | |||
Section 4.2.2 of [I-D.ietf-taps-arch]), in which the necessary | Section 4.2) and | |||
protocol handshakes are conducted so that the Transport Services | ||||
system can select which set to use (see Section 4.3). Candidate | * Candidate Racing (defined in Section 4.2.2 of [RFC9621]), in which | |||
Racing involves attempting multiple options for connection | the necessary protocol handshakes are conducted so that the | |||
establishment, and choosing the first option to succeed as the | Transport Services system can select which set to use (see | |||
Section 4.3). | ||||
Candidate Racing involves attempting multiple options for connection | ||||
establishment and choosing the first option to succeed as the | ||||
Protocol Stack to use for the connection. These attempts are usually | Protocol Stack to use for the connection. These attempts are usually | |||
staggered, starting each next option after a delay, but they can also | staggered, starting each next option after a delay; however, they can | |||
be performed in parallel or only after waiting for failures. | also be performed in parallel or only after waiting for failures. | |||
For ease of illustration, this document structures the candidates for | For ease of illustration, this document structures the candidates for | |||
racing as a tree (see Section 4.1). This is not meant to restrict | racing as a tree (see Section 4.1). This is not meant to restrict | |||
implementations from structuring racing candidates differently. | implementations from structuring racing candidates differently. | |||
The most simple example of this process might involve identifying the | The simplest example of this process might involve identifying the | |||
single IP address to which the implementation wishes to connect, | single IP address to which the implementation wishes to connect, | |||
using the system's current default path (i.e., using the default | using the system's current default path (i.e., using the default | |||
interface), and starting a TCP handshake to establish a stream to the | interface), and starting a TCP handshake to establish a stream to the | |||
specified IP address. However, each step may also differ depending | specified IP address. However, each step may also differ depending | |||
on the requirements of the connection: if the Endpoint Identifier is | on the requirements of the connection: | |||
a hostname and port, then there may be multiple resolved addresses | ||||
that are available; there may also be multiple paths available, (in | * if the Endpoint Identifier is a hostname and port, then there may | |||
this case using an interface other than the default system | be multiple resolved addresses that are available; | |||
interface); and some protocols may not need any transport handshake | ||||
to be considered "established" (such as UDP), while other connections | * there may also be multiple paths available (in this case using an | |||
may utilize layered protocol handshakes, such as TLS over TCP. | interface other than the default system interface); and | |||
* some protocols may not need any transport handshake to be | ||||
considered "established" (such as UDP), while other connections | ||||
may utilize layered protocol handshakes, such as TLS over TCP. | ||||
Whenever an implementation has multiple options for connection | Whenever an implementation has multiple options for connection | |||
establishment, it can view the set of all individual connection | establishment, it can view the set of all individual connection | |||
establishment options as a single, aggregate connection | establishment options as a single aggregate connection establishment. | |||
establishment. The aggregate set conceptually includes every valid | The aggregate set conceptually includes every valid combination of | |||
combination of endpoints, paths, and protocols. As an example, | endpoints, paths, and protocols. As an example, consider an | |||
consider an implementation that initiates a TCP connection to a | implementation that initiates a TCP connection to a hostname + port | |||
hostname + port Endpoint Identifier, and has two valid interfaces | Endpoint Identifier and that has two valid interfaces available (Wi- | |||
available (Wi-Fi and LTE). The hostname resolves to a single IPv4 | Fi and LTE). The hostname resolves to a single IPv4 address on the | |||
address on the Wi-Fi network, and resolves to the same IPv4 address | Wi-Fi network, and resolves to the same IPv4 address on the LTE | |||
on the LTE network, as well as a single IPv6 address. The aggregate | network, as well as a single IPv6 address. The aggregate set of | |||
set of connection establishment options can be viewed as follows: | connection establishment options can be viewed as follows: | |||
Aggregate [Endpoint Identifier: www.example.com:443] [Interface: Any] [Protocol: TCP] | Aggregate [Endpoint Identifier: www.example.com:443] [Interface: Any] [Protocol: TCP] | |||
|-> [Endpoint Identifier: [2001:db8:23::1]:443] [Interface: Wi-Fi] [Protocol: TCP] | |-> [Endpoint Identifier: [2001:db8:23::1]:443] [Interface: Wi-Fi] [Protocol: TCP] | |||
|-> [Endpoint Identifier: 192.0.2.1:443] [Interface: LTE] [Protocol: TCP] | |-> [Endpoint Identifier: 192.0.2.1:443] [Interface: LTE] [Protocol: TCP] | |||
|-> [Endpoint Identifier: [2001:db8:42::1]:443] [Interface: LTE] [Protocol: TCP] | |-> [Endpoint Identifier: [2001:db8:42::1]:443] [Interface: LTE] [Protocol: TCP] | |||
Any one of these sub-entries on the aggregate connection attempt | Any one of these subentries on the aggregate connection attempt would | |||
would satisfy the original application intent. The concern of this | satisfy the original application intent. The concern of this section | |||
section is the algorithm defining which of these options to try, | is the algorithm defining which of these options to try, when to try | |||
when, and in what order. | them, and in what order. | |||
During Candidate Gathering (Section 4.2), an implementation prunes | During Candidate Gathering (Section 4.2), an implementation prunes | |||
and sorts branches according to the Selection Property preferences | and sorts branches according to the Selection Property preferences | |||
(Section 6.2 of [I-D.ietf-taps-interface]. It first excludes all | (Section 6.2 of [RFC9622]). First, it excludes all protocols and | |||
protocols and paths that match a Prohibit property or do not match | paths that match a Prohibit property or do not match all Require | |||
all Require properties. Then it will sort branches according to | properties. Then, it will sort branches according to Preferred | |||
Preferred properties, Avoided properties, and possibly other | properties, Avoided properties, and, possibly, other criteria. | |||
criteria. | ||||
4.1. Structuring Candidates as a Tree | 4.1. Structuring Candidates as a Tree | |||
As noted above, the consideration of multiple candidates in a | As noted above, the consideration of multiple candidates in a | |||
gathering and racing process can be conceptually structured as a | gathering and racing process can be conceptually structured as a | |||
tree; this terminological convention is used throughout this | tree; this terminological convention is used throughout this | |||
document. | document. | |||
Each leaf node of the tree represents a single, coherent connection | Each leaf node of the tree represents a single coherent connection | |||
attempt, with an endpoint, a network path, and a set of protocols | attempt with an endpoint, a network path, and a set of protocols that | |||
that can directly negotiate and send data on the network. Each node | can directly negotiate and send data on the network. Each node in | |||
in the tree that is not a leaf represents a connection attempt that | the tree that is not a leaf represents a connection attempt that is | |||
is either underspecified, or else includes multiple distinct options. | either underspecified or includes multiple distinct options. For | |||
For example, when connecting on an IP network, a connection attempt | example, when connecting on an IP network, a connection attempt to a | |||
to a hostname and port is underspecified, because the connection | hostname and port is underspecified because the connection attempt | |||
attempt requires a resolved IP address as its Remote Endpoint | requires a resolved IP address as its Remote Endpoint Identifier. In | |||
Identifier. In this case, the node represented by the connection | this case, the node represented by the connection attempt to the | |||
attempt to the hostname is a parent node, with child nodes for each | hostname is a parent node with child nodes for each IP address. | |||
IP address. Similarly, an implementation that is allowed to connect | Similarly, an implementation that is allowed to connect using | |||
using multiple interfaces will have a parent node of the tree for the | multiple interfaces will have a parent node of the tree for the | |||
decision between the network paths, with a branch for each interface. | decision between the network paths with a branch for each interface. | |||
The example aggregate connection attempt above can be drawn as a tree | The example aggregate connection attempt above can be drawn as a tree | |||
by grouping the addresses resolved on the same interface into | by grouping the addresses resolved on the same interface into | |||
branches: | branches: | |||
|| | || | |||
+==============================+ | +==============================+ | |||
| www.example.com:443/any path | | | www.example.com:443/any path | | |||
+==============================+ | +==============================+ | |||
// \\ | // \\ | |||
skipping to change at page 9, line 51 ¶ | skipping to change at line 413 ¶ | |||
+============================+ +=====================+ +==========================+ | +============================+ +=====================+ +==========================+ | |||
The rest of this section will use a notation scheme to represent this | The rest of this section will use a notation scheme to represent this | |||
tree. The root node (or parent node) of the tree will be represented | tree. The root node (or parent node) of the tree will be represented | |||
by a single integer, such as "1". ("1" is used assuming that this is | by a single integer, such as "1". ("1" is used assuming that this is | |||
the first connection made by the system; future connections created | the first connection made by the system; future connections created | |||
by the application would allocate numbers in an increasing manner.) | by the application would allocate numbers in an increasing manner.) | |||
Each child of that node will have an integer that identifies it, from | Each child of that node will have an integer that identifies it, from | |||
1 to the number of children. That child node will be uniquely | 1 to the number of children. That child node will be uniquely | |||
identified by concatenating its integer to its parent's identifier | identified by concatenating its integer to its parent's identifier | |||
with a dot in between, such as "1.1" and "1.2". Each node will be | with a dot character (".") in between, such as "1.1" and "1.2". Each | |||
summarized by a tuple of three elements: endpoint, path (labeled here | node will be summarized by a tuple of three elements: endpoint, path | |||
by interface), and protocol. In Protocol Stacks, the layers are | (labeled here by interface), and protocol. In Protocol Stacks, the | |||
separated by '/' and ordered with the protocol closest to the | layers are separated by a slash character ("/") and ordered with the | |||
application first. The above example can now be written more | protocol closest to the application first. The above example can now | |||
succinctly as: | be written more succinctly as: | |||
1 [www.example.com:443, any path, TCP] | 1 [www.example.com:443, any path, TCP] | |||
1.1 [www.example.com:443, Wi-Fi, TCP] | 1.1 [www.example.com:443, Wi-Fi, TCP] | |||
1.1.1 [[2001:db8:23::1]:443, Wi-Fi, TCP] | 1.1.1 [[2001:db8:23::1]:443, Wi-Fi, TCP] | |||
1.2 [www.example.com:443, LTE, TCP] | 1.2 [www.example.com:443, LTE, TCP] | |||
1.2.1 [192.0.2.1:443, LTE, TCP] | 1.2.1 [192.0.2.1:443, LTE, TCP] | |||
1.2.2 [[2001:db8.42::1]:443, LTE, TCP] | 1.2.2 [[2001:db8.42::1]:443, LTE, TCP] | |||
When an implementation is asked to establish a single connection, | When an implementation is asked to establish a single connection, | |||
only one of the leaf nodes in the candidate set is needed to transfer | only one of the leaf nodes in the candidate set is needed to transfer | |||
data. Thus, once a single leaf node becomes ready to use, then the | data. Thus, once a single leaf node becomes ready to use, the | |||
connection establishment tree is considered ready. One way to | connection establishment tree is considered ready. One way to | |||
implement this is by having every leaf node update the state of its | implement this is by having every leaf node update the state of its | |||
parent node when it becomes ready, until the root node of the tree is | parent node when it becomes ready until the root node of the tree is | |||
ready, which then notifies the application that the Connection as a | ready, which then notifies the application that the Connection as a | |||
whole is ready to use. | whole is ready to use. | |||
A connection establishment tree may consist of only a single node, | A connection establishment tree may consist of only a single node, | |||
such as a connection attempt to an IP address over a single interface | such as a connection attempt to an IP address over a single interface | |||
with a single protocol. | with a single protocol. | |||
1 [[2001:db8:23::1]:443, Wi-Fi, TCP] | 1 [[2001:db8:23::1]:443, Wi-Fi, TCP] | |||
A root node may also only have one child (or leaf) node, such as a | A root node may also only have one child (or leaf) node, such as a | |||
skipping to change at page 10, line 45 ¶ | skipping to change at line 456 ¶ | |||
1.1 [[2001:db8:23::1]:443, Wi-Fi, TCP] | 1.1 [[2001:db8:23::1]:443, Wi-Fi, TCP] | |||
4.1.1. Branch Types | 4.1.1. Branch Types | |||
There are three types of branching from a parent node into one or | There are three types of branching from a parent node into one or | |||
more child nodes. Any parent node of the tree must only use one type | more child nodes. Any parent node of the tree must only use one type | |||
of branching. | of branching. | |||
4.1.1.1. Derived Endpoints | 4.1.1.1. Derived Endpoints | |||
If a connection originally targets a single Endpoint Identifer, there | If a connection originally targets a single Endpoint Identifier, | |||
may be multiple endpoint candidates of different types that can be | there may be multiple endpoint candidates of different types that can | |||
derived from the original. This creates an ordered list of the | be derived from the original. This creates an ordered list of the | |||
derived endpoint candidates according to application preference, | derived endpoint candidates according to application preference, | |||
system policy and expected performance. | system policy, and expected performance. | |||
DNS hostname-to-address resolution is the most common method of | DNS hostname-to-address resolution is the most common method of | |||
endpoint derivation. When trying to connect to a hostname Endpoint | endpoint derivation. When trying to connect to a hostname Endpoint | |||
Identifer on a traditional IP network, the implementation should send | Identifier on a traditional IP network, the implementation should | |||
all applicable DNS queries. Commonly, this will include both A | send all applicable DNS queries. Commonly, this will include both A | |||
(IPv4) and AAAA (IPv6) records if both address families are supported | (IPv4) and AAAA (IPv6) records if both address families are supported | |||
on the local interface. This can also include SRV records [RFC2782], | on the local interface. This can also include SRV records [RFC2782], | |||
SVCB and HTTPS records [I-D.ietf-dnsop-svcb-https], or other future | SVCB and HTTPS records [RFC9460], or other future record types. The | |||
record types. The algorithm for ordering and racing these addresses | algorithm for ordering and racing these addresses should follow the | |||
should follow the recommendations in Happy Eyeballs [RFC8305]. | recommendations in Happy Eyeballs [RFC8305]. | |||
1 [www.example.com:443, Wi-Fi, TCP] | 1 [www.example.com:443, Wi-Fi, TCP] | |||
1.1 [[2001:db8::1]:443, Wi-Fi, TCP] | 1.1 [[2001:db8::1]:443, Wi-Fi, TCP] | |||
1.2 [192.0.2.1:443, Wi-Fi, TCP] | 1.2 [192.0.2.1:443, Wi-Fi, TCP] | |||
1.3 [[2001:db8::2]:443, Wi-Fi, TCP] | 1.3 [[2001:db8::2]:443, Wi-Fi, TCP] | |||
1.4 [[2001:db8::3]:443, Wi-Fi, TCP] | 1.4 [[2001:db8::3]:443, Wi-Fi, TCP] | |||
DNS-Based Service Discovery [RFC6763] can also provide an endpoint | DNS-Based Service Discovery [RFC6763] can also provide an endpoint | |||
derivation step. When trying to connect to a named service, the | derivation step. When trying to connect to a named service, the | |||
client may discover one or more hostname and port pairs on the local | client may discover one or more hostname and port pairs on the local | |||
skipping to change at page 11, line 37 ¶ | skipping to change at line 494 ¶ | |||
addresses, which would create multiple layers of branching. | addresses, which would create multiple layers of branching. | |||
1 [term-printer._ipp._tcp.meeting.example.com, Wi-Fi, TCP] | 1 [term-printer._ipp._tcp.meeting.example.com, Wi-Fi, TCP] | |||
1.1 [term-printer.meeting.example.com:631, Wi-Fi, TCP] | 1.1 [term-printer.meeting.example.com:631, Wi-Fi, TCP] | |||
1.1.1 [31.133.160.18:631, Wi-Fi, TCP] | 1.1.1 [31.133.160.18:631, Wi-Fi, TCP] | |||
Applications can influence which derived Endpoints are allowed and | Applications can influence which derived Endpoints are allowed and | |||
preferred via Selection Properties set on the Preconnection. For | preferred via Selection Properties set on the Preconnection. For | |||
example, setting a preference for useTemporaryLocalAddress would | example, setting a preference for useTemporaryLocalAddress would | |||
prefer the use of IPv6 over IPv4, and requiring | prefer the use of IPv6 over IPv4, and requiring | |||
useTemporaryLocalAddress would eliminate IPv4 options, since IPv4 | useTemporaryLocalAddress would eliminate IPv4 options since IPv4 does | |||
does not support temporary addresses. | not support temporary addresses. | |||
4.1.1.2. Network Paths | 4.1.1.2. Network Paths | |||
If a client has multiple network paths available to it, e.g., a | If a client has multiple network paths available to it, e.g., a | |||
mobile client with interfaces for both Wi-Fi and Cellular | mobile client with interfaces for both Wi-Fi and Cellular | |||
connectivity, it can attempt a connection over any of the paths. | connectivity, it can attempt a connection over any of the paths. | |||
This represents a branch point in the connection establishment. | This represents a branch point in the connection establishment. | |||
Similar to a derived endpoint, the paths should be ranked based on | Similar to a derived endpoint, the paths should be ranked based on | |||
preference, system policy, and performance. Attempts should be | preference, system policy, and performance. Attempts should be | |||
started on one path (e.g., a specific interface), and then | started on one path (e.g., a specific interface) and then | |||
successively on other paths (or interfaces) after delays based on the | successively on other paths (or interfaces) after delays based on the | |||
expected path round-trip-time or other available metrics. | expected path RTT or other available metrics. | |||
1 [192.0.2.1:443, any path, TCP] | 1 [192.0.2.1:443, any path, TCP] | |||
1.1 [192.0.2.1:443, Wi-Fi, TCP] | 1.1 [192.0.2.1:443, Wi-Fi, TCP] | |||
1.2 [192.0.2.1:443, LTE, TCP] | 1.2 [192.0.2.1:443, LTE, TCP] | |||
The same approach applies to any situation in which the client is | The same approach applies to any situation in which the client is | |||
aware of multiple links or views of the network. A single interface | aware of multiple links or views of the network. A single interface | |||
may be shared by multiple network paths, each with a coherent set of | may be shared by multiple network paths, each with a coherent set of | |||
addresses, routes, DNS server, and more. A path may also represent a | addresses, routes, DNS server, and more. A path may also represent a | |||
virtual interface service such as a Virtual Private Network (VPN). | virtual interface service such as a Virtual Private Network (VPN). | |||
The list of available paths should be constrained by any requirements | The list of available paths should be constrained by any requirements | |||
the application sets, as well as by the system policy. | the application sets as well as by the system policy. | |||
4.1.1.3. Protocol Options | 4.1.1.3. Protocol Options | |||
Differences in possible protocol compositions and options can also | Differences in possible protocol compositions and options can also | |||
provide a branching point in connection establishment. This allows | provide a branching point in connection establishment. This allows | |||
clients to be resilient to situations in which a certain protocol is | clients to be resilient to situations in which a certain protocol is | |||
not functioning on a server or network. | not functioning on a server or network. | |||
This approach is commonly used for connections with optional proxy | This approach is commonly used for connections with optional proxy | |||
server configurations. A single connection might have several | server configurations. A single connection might have several | |||
options available: an HTTP-based proxy, a SOCKS-based proxy, or no | options available: an HTTP-based proxy, a SOCKS-based proxy, or no | |||
proxy. As above, these options should be ranked based on preference, | proxy. As above, these options should be ranked based on preference, | |||
system policy, and performance and attempted in succession. | system policy, and performance, and should be attempted in | |||
succession. | ||||
1 [www.example.com:443, any path, HTTP/TCP] | 1 [www.example.com:443, any path, HTTP/TCP] | |||
1.1 [192.0.2.8:443, any path, HTTP/HTTP Proxy/TCP] | 1.1 [192.0.2.8:443, any path, HTTP/HTTP Proxy/TCP] | |||
1.2 [192.0.2.7:10234, any path, HTTP/SOCKS/TCP] | 1.2 [192.0.2.7:10234, any path, HTTP/SOCKS/TCP] | |||
1.3 [www.example.com:443, any path, HTTP/TCP] | 1.3 [www.example.com:443, any path, HTTP/TCP] | |||
1.3.1 [192.0.2.1:443, any path, HTTP/TCP] | 1.3.1 [192.0.2.1:443, any path, HTTP/TCP] | |||
This approach also allows a client to attempt different sets of | This approach also allows a client to attempt different sets of | |||
application and transport protocols that, when available, could | application and transport protocols that, when available, could | |||
provide preferable features. For example, the protocol options could | provide preferable features. For example, the protocol options could | |||
involve QUIC [RFC9000] over UDP on one branch, and HTTP/2 [RFC7540] | involve QUIC [RFC9000] over UDP on one branch and HTTP/2 [RFC7540] | |||
over TLS over TCP on the other: | over TLS over TCP on the other: | |||
1 [www.example.com:443, any path, HTTP] | 1 [www.example.com:443, any path, HTTP] | |||
1.1 [www.example.com:443, any path, HTTP3/QUIC/UDP] | 1.1 [www.example.com:443, any path, HTTP3/QUIC/UDP] | |||
1.1.1 [192.0.2.1:443, any path, HTTP3/QUIC/UDP] | 1.1.1 [192.0.2.1:443, any path, HTTP3/QUIC/UDP] | |||
1.2 [www.example.com:443, any path, HTTP2/TLS/TCP] | 1.2 [www.example.com:443, any path, HTTP2/TLS/TCP] | |||
1.2.1 [192.0.2.1:443, any path, HTTP2/TLS/TCP] | 1.2.1 [192.0.2.1:443, any path, HTTP2/TLS/TCP] | |||
Another example is racing SCTP with TCP: | Another example is racing SCTP with TCP: | |||
1 [www.example.com:4740, any path, reliable-inorder-stream] | 1 [www.example.com:4740, any path, reliable-inorder-stream] | |||
1.1 [www.example.com:4740, any path, SCTP] | 1.1 [www.example.com:4740, any path, SCTP] | |||
1.1.1 [192.0.2.1:4740, any path, SCTP] | 1.1.1 [192.0.2.1:4740, any path, SCTP] | |||
1.2 [www.example.com:4740, any path, TCP] | 1.2 [www.example.com:4740, any path, TCP] | |||
1.2.1 [192.0.2.1:4740, any path, TCP] | 1.2.1 [192.0.2.1:4740, any path, TCP] | |||
Implementations that support racing protocols and protocol options | Implementations that support racing protocols and protocol options | |||
should maintain a history of which protocols and protocol options | should maintain a history of which protocols and protocol options | |||
were successfully established, on a per-network and per-endpoint | were successfully established on a per-network and per-endpoint basis | |||
basis (see Section 9.2). This information can influence future | (see Section 9.2). This information can influence future racing | |||
racing decisions to prioritize or prune branches. | decisions to prioritize or prune branches. | |||
4.1.2. Branching Order-of-Operations | 4.1.2. Branching Order-of-Operations | |||
Branch types ought to occur in a specific order relative to one | Branch types ought to occur in a specific order relative to one | |||
another to avoid creating leaf nodes with invalid or incompatible | another to avoid creating leaf nodes with invalid or incompatible | |||
settings. In the example above, it would be invalid to branch for | settings. In the example above, it would be invalid to branch for | |||
derived endpoints (the DNS results for www.example.com) before | derived endpoints (the DNS results for www.example.com) before | |||
branching between interface paths, since there are situations when | branching between interface paths since there are situations when the | |||
the results will be different across networks due to private names or | results will be different across networks due to private names or | |||
different supported IP versions. Implementations need to be careful | different supported IP versions. Implementations need to be careful | |||
to branch in a consistent order that results in usable leaf nodes | to branch in a consistent order that results in usable leaf nodes | |||
whenever there are multiple branch types that could be used from a | whenever there are multiple branch types that could be used from a | |||
single node. | single node. | |||
This document recommends the following order of operations for | This document recommends the following order of operations for | |||
branching: | branching: | |||
1. Network Paths | 1. Network Paths | |||
2. Protocol Options | 2. Protocol Options | |||
3. Derived Endpoints | 3. Derived Endpoints | |||
where a lower number indicates higher precedence and therefore higher | where a lower number indicates higher precedence and, therefore, | |||
placement in the tree. Branching between paths is the first in the | higher placement in the tree. Branching between paths is the first | |||
list because results across multiple interfaces are likely not | in the list because results across multiple interfaces are likely not | |||
related to one another: endpoint resolution may return different | related to one another: endpoint resolution may return different | |||
results, especially when using locally resolved host and service | results, especially when using locally resolved host and service | |||
names, and which protocols are supported and preferred may differ | names and the protocols that are supported and preferred may differ | |||
across interfaces. Thus, if multiple paths are attempted, the | across interfaces. Thus, if multiple paths are attempted, the | |||
overall connection establishment process can be seen as a race | overall connection establishment process can be seen as a race | |||
between the available paths or interfaces. | between the available paths or interfaces. | |||
Protocol options are next checked in order. Whether or not a set of | Protocol options are next checked in order. Whether or not a set of | |||
protocols, or protocol-specific options, can successfully connect is | protocols, or protocol-specific options, can successfully connect is | |||
generally not dependent on which specific IP address is used. | generally not dependent on which specific IP address is used. | |||
Furthermore, the Protocol Stacks being attempted may influence or | Furthermore, the Protocol Stacks being attempted may influence or | |||
altogether change the Endpoint Identifers being used. Adding a proxy | altogether change the Endpoint Identifiers being used. Adding a | |||
to a connection's branch will change the Endpoint Identifer to the | proxy to a connection's branch will change the Endpoint Identifier to | |||
proxy's IP address or hostname. Choosing an alternate protocol may | the proxy's IP address or hostname. Choosing an alternate protocol | |||
also modify the ports that should be selected. | may also modify the ports that should be selected. | |||
Branching for derived endpoints is the final step, and may have | Branching for derived endpoints is the final step and may have | |||
multiple layers of derivation or resolution, such as DNS service | multiple layers of derivation or resolution, such as DNS service | |||
resolution and DNS hostname resolution. | resolution and DNS hostname resolution. | |||
For example, if the application has indicated both a preference for | For example, if the application has indicated both a preference for | |||
WiFi over LTE and for a feature only available in SCTP, branches will | Wi-Fi over LTE and for a feature only available in SCTP, branches | |||
be first sorted accord to path selection, with WiFi attempted first. | will first be sorted according to path selection, with Wi-Fi | |||
Then, branches with SCTP will be attempted first within their subtree | attempted first. Then, branches with SCTP will be attempted first | |||
according to the properties influencing protocol selection. However, | within their subtree according to the properties influencing protocol | |||
if the implementation has current cache information that SCTP is not | selection. However, if the implementation has current cache | |||
available on the path over WiFi, there would be no SCTP node in the | information that SCTP is not available on the path over Wi-Fi, there | |||
WiFi subtree. Here, the path over WiFi will be attempted first, and, | would be no SCTP node in the Wi-Fi subtree. Here, the path over Wi- | |||
if connection establishment succeeds, TCP will be used. Thus, the | Fi will be attempted first, and, if connection establishment | |||
Selection Property preferring WiFi takes precedence over the Property | succeeds, TCP will be used. Thus, the Selection Property preferring | |||
that led to a preference for SCTP. | Wi-Fi takes precedence over the Property that led to a preference for | |||
SCTP. | ||||
1. [www.example.com:80, any path, reliable-inorder-stream] | 1. [www.example.com:80, any path, reliable-inorder-stream] | |||
1.1 [192.0.2.1:443, Wi-Fi, reliable-inorder-stream] | 1.1 [192.0.2.1:443, Wi-Fi, reliable-inorder-stream] | |||
1.1.1 [192.0.2.1:443, Wi-Fi, TCP] | 1.1.1 [192.0.2.1:443, Wi-Fi, TCP] | |||
1.2 [192.0.3.1:443, LTE, reliable-inorder-stream] | 1.2 [192.0.3.1:443, LTE, reliable-inorder-stream] | |||
1.2.1 [192.0.3.1:443, LTE, SCTP] | 1.2.1 [192.0.3.1:443, LTE, SCTP] | |||
1.2.2 [192.0.3.1:443, LTE, TCP] | 1.2.2 [192.0.3.1:443, LTE, TCP] | |||
4.1.3. Sorting Branches | 4.1.3. Sorting Branches | |||
Implementations should sort the branches of the tree of connection | Implementations should sort the branches of the tree of connection | |||
options in order of their preference rank, from most preferred to | options in order of their preference rank from most preferred to | |||
least preferred as specified by Selection Properties | least preferred as specified by Selection Properties [RFC9622]. Leaf | |||
[I-D.ietf-taps-interface]. Leaf nodes on branches with higher | nodes on branches with higher rankings represent connection attempts | |||
rankings represent connection attempts that will be raced first. | that will be raced first. | |||
In addition to the properties provided by the application, an | In addition to the properties provided by the application, an | |||
implementation may include additional criteria such as cached | implementation may include additional criteria such as cached | |||
performance estimates, see Section 9.2, or system policy, see | performance estimates (see Section 9.2) or system policy (see | |||
Section 3.2, in the ranking. Two examples of how Selection and | Section 3.2) in the ranking. Two examples of how Selection and | |||
Connection Properties may be used to sort branches are provided | Connection Properties may be used to sort branches are provided | |||
below: | below: | |||
* "Interface Instance or Type" (property name interface): If the | "Interface Instance or Type" (property name interface): If the | |||
application specifies an interface type to be preferred or | application specifies an interface type to be preferred or | |||
avoided, implementations should accordingly rank the paths. If | avoided, implementations should accordingly rank the paths. If | |||
the application specifies an interface type to be required or | the application specifies an interface type to be required or | |||
prohibited, an implementation is expected to exclude the non- | prohibited, an implementation is expected to exclude the | |||
conforming paths. | nonconforming paths. | |||
* "Capacity Profile" (property name connCapacityProfile): An | "Capacity Profile" (property name connCapacityProfile): An implement | |||
implementation can use the capacity profile to prefer paths that | ation can use the capacity profile to prefer paths that match an | |||
match an application's expected traffic profile. This match will | application's expected traffic profile. This match will use | |||
use cached performance estimates, see Section 9.2. Some examples | cached performance estimates; see Section 9.2. Some examples of | |||
of path preferences based on capacity profiles include: | path preferences based on capacity profiles include: | |||
- Low Latency/Interactive: Prefer paths with the lowest expected | Low Latency/Interactive: Prefer paths with the lowest expected | |||
Round Trip Time, based on observed Round Trip Time estimates; | Round-Trip Time (RTT), based on observed RTT estimates; | |||
- Low Latency/Non-Interactive: Prefer paths with a low expected | Low Latency/Non-Interactive: Prefer paths with a low expected | |||
Round Trip Time, but can tolerate delay variation; | Round-Trip Time (RTT), but can tolerate delay variation; | |||
- Constant-Rate Streaming: Prefer paths that are expected to | Constant-Rate Streaming: Prefer paths that are expected to | |||
satisfy the requested stream send or receive bitrate, based on | satisfy the requested stream send or receive bitrate based on | |||
the observed maximum throughput; | the observed maximum throughput; | |||
- Capacity-Seeking: Prefer adapting to paths to determine the | Capacity-Seeking: Prefer adapting to paths to determine the | |||
highest available capacity, based on the observed maximum | highest available capacity based on the observed maximum | |||
throughput. | throughput. | |||
As another example, branch sorting can also be influenced by bounds | As another example, branch sorting can also be influenced by bounds | |||
on the send or receive rate (Selection Properties minSendRate / | on the send or receive rate (Selection Properties minSendRate / | |||
minRecvRate / maxSendRate / maxRecvRate): if the application | minRecvRate / maxSendRate / maxRecvRate): if the application | |||
indicates a bound on the expected send or receive bitrate, an | indicates a bound on the expected send or receive bitrate, an | |||
implementation may prefer a path that can likely provide the desired | implementation may prefer a path that can likely provide the desired | |||
bandwidth, based on cached maximum throughput, see Section 9.2. The | bandwidth, based on cached maximum throughput (see Section 9.2). The | |||
application may know the send or receive bitrate from metadata in | application may know the send or receive bitrate from metadata in | |||
adaptive HTTP streaming, such as MPEG-DASH. | adaptive HTTP streaming, such as MPEG-DASH. | |||
Implementations process the Properties (Section 6.2 of | Implementations process the Properties (Section 6.2 of [RFC9622]) in | |||
[I-D.ietf-taps-interface]) in the following order: Prohibit, Require, | the following order: Prohibit, Require, Prefer, Avoid. If Selection | |||
Prefer, Avoid. If Selection Properties contain any prohibited | Properties contain any prohibited properties, the implementation | |||
properties, the implementation should first purge branches containing | should first purge branches containing nodes with these properties. | |||
nodes with these properties. For required properties, it should only | For required properties, it should only keep branches that satisfy | |||
keep branches that satisfy these requirements. Finally, it should | these requirements. Finally, it should order the branches according | |||
order the branches according to the preferred properties, and finally | to the preferred properties and use any avoided properties as a | |||
use any avoided properties as a tiebreaker. When ordering branches, | tiebreaker. When ordering branches, an implementation can give more | |||
an implementation can give more weight to properties that the | weight to properties that the application has explicitly set rather | |||
application has explicitly set, than to the properties that are | than to the properties that are set by default. | |||
default. | ||||
The available protocols and paths on a specific system and in a | The available protocols and paths on a specific system and in a | |||
specific context can change; therefore, the result of sorting and the | specific context can change; therefore, the result of sorting and the | |||
outcome of racing may vary, even when using the same Selection and | outcome of racing may vary, even when using the same Selection and | |||
Connection Properties. However, an implementation ought to provide a | Connection Properties. However, an implementation ought to provide a | |||
consistent outcome to applications, e.g., by preferring protocols and | consistent outcome to applications, e.g., by preferring protocols and | |||
paths that are already used by existing Connections that specified | paths that are already used by existing Connections that specified | |||
similar Properties. | similar Properties. | |||
4.2. Candidate Gathering | 4.2. Candidate Gathering | |||
skipping to change at page 16, line 25 ¶ | skipping to change at line 715 ¶ | |||
The step of gathering candidates involves identifying which paths, | The step of gathering candidates involves identifying which paths, | |||
protocols, and endpoints may be used for a given Connection. This | protocols, and endpoints may be used for a given Connection. This | |||
list is determined by the requirements, prohibitions, and preferences | list is determined by the requirements, prohibitions, and preferences | |||
of the application as specified in the Selection Properties. | of the application as specified in the Selection Properties. | |||
4.2.1. Gathering Endpoint Candidates | 4.2.1. Gathering Endpoint Candidates | |||
Both Local and Remote Endpoint Candidates must be discovered during | Both Local and Remote Endpoint Candidates must be discovered during | |||
connection establishment. To support Interactive Connectivity | connection establishment. To support Interactive Connectivity | |||
Establishment (ICE) [RFC8445], or similar protocols that involve out- | Establishment (ICE) [RFC8445], or similar protocols that involve out- | |||
of-band indirect signalling to exchange candidates with the Remote | of-band indirect signaling to exchange candidates with the Remote | |||
Endpoint, it is important to query the set of candidate Local | Endpoint, it is important to query the set of candidate Local | |||
Endpoints, and provide the Protocol Stack with a set of candidate | Endpoints and provide the Protocol Stack with a set of candidate | |||
Remote Endpoints, before the Local Endpoint attempts to establish | Remote Endpoints before the Local Endpoint attempts to establish | |||
connections. | connections. | |||
4.2.1.1. Local Endpoint candidates | 4.2.1.1. Local Endpoint Candidates | |||
The set of possible Local Endpoints is gathered. In a simple case, | The set of possible Local Endpoints is gathered. In a simple case, | |||
this merely enumerates the local interfaces and protocols, and | this merely enumerates the local interfaces and protocols and | |||
allocates ephemeral source ports. For example, a system that has | allocates ephemeral source ports. For example, a system that has Wi- | |||
WiFi and Ethernet and supports IPv4 and IPv6 might gather four | Fi and Ethernet and supports IPv4 and IPv6 might gather four | |||
candidate Local Endpoints (IPv4 on Ethernet, IPv6 on Ethernet, IPv4 | candidate Local Endpoints (IPv4 on Ethernet, IPv6 on Ethernet, IPv4 | |||
on WiFi, and IPv6 on WiFi) that can form the source for a transient. | on Wi-Fi, and IPv6 on Wi-Fi) that can form the source for a | |||
transient. | ||||
If NAT traversal is required, the process of gathering Local | If NAT traversal is required, the process of gathering Local | |||
Endpoints becomes broadly equivalent to the ICE Candidate Gathering | Endpoints becomes broadly equivalent to the ICE Candidate Gathering | |||
phase (see Section 5.1.1 of [RFC8445]). The endpoint determines its | phase (see Section 5.1.1 of [RFC8445]). The endpoint determines its | |||
server reflexive Local Endpoints (i.e., the translated address of a | server-reflexive Local Endpoints (i.e., the translated address of a | |||
Local Endpoint, on the other side of a NAT, e.g via a STUN sever | Local Endpoint, on the other side of a NAT, e.g., via a STUN server | |||
[RFC5389]) and relayed Local Endpoints (e.g., via a TURN server | [RFC5389]) and relayed Local Endpoints (e.g., via a TURN server | |||
[RFC5766] or other relay), for each interface and network protocol. | [RFC5766] or other relay) for each interface and network protocol. | |||
These are added to the set of candidate Local Endpoint Identifers for | These are added to the set of candidate Local Endpoint Identifiers | |||
this connection. | for this connection. | |||
Gathering Local Endpoints is primarily a local operation, although it | Gathering Local Endpoints is primarily a local operation, although it | |||
might involve exchanges with a STUN server to derive server reflexive | might involve exchanges with a STUN server to derive server-reflexive | |||
Local Endpoints, or with a TURN server or other relay to derive | Local Endpoints or with a TURN server or other relay to derive | |||
relayed Local Endpoints. However, it does not involve communication | relayed Local Endpoints. However, it does not involve communication | |||
with the Remote Endpoint. | with the Remote Endpoint. | |||
4.2.1.2. Remote Endpoint Candidates | 4.2.1.2. Remote Endpoint Candidates | |||
The Remote Endpoint Identifer is typically a name that needs to be | The Remote Endpoint Identifier is typically a name that needs to be | |||
resolved into a set of possible addresses that can be used for | resolved into a set of possible addresses that can be used for | |||
communication. Resolving the Remote Endpoint is the process of | communication. Resolving the Remote Endpoint is the process of | |||
recursively performing such name lookups, until fully resolved, to | recursively performing such name lookups, until fully resolved, to | |||
return the set of candidates for the Remote Endpoint of this | return the set of candidates for the Remote Endpoint of this | |||
Connection. | Connection. | |||
How this resolution is done will depend on the type of the Remote | How this resolution is done will depend on the type of the Remote | |||
Endpoint, and can also be specific to each Local Endpoint. A common | Endpoint and can also be specific to each Local Endpoint. A common | |||
case is when the Remote Endpoint Identifer is a DNS name, in which | case is when the Remote Endpoint Identifier is a DNS name, in which | |||
case it is resolved to give a set of IPv4 and IPv6 addresses | case, it is resolved to give a set of IPv4 and IPv6 addresses | |||
representing that name. Some types of Remote Endpoint Identifers | representing that name. Some types of Remote Endpoint Identifiers | |||
might require more complex resolution. Resolving the Remote Endpoint | might require more complex resolution. Resolving the Remote Endpoint | |||
for a peer-to-peer connection might involve communication with a | for a peer-to-peer connection might involve communication with a | |||
rendezvous server, which in turn contacts the peer to gain consent to | rendezvous server. The server, in turn, contacts the peer to gain | |||
communicate and retrieve its set of candidate Local Endpoints, which | consent to communicate and retrieve its set of candidate Local | |||
are returned and form the candidate remote addresses for contacting | Endpoints. These Endpoints are returned and form the candidate | |||
that peer. | remote addresses for contacting that peer. | |||
Resolving the Remote Endpoint is not a local operation. It will | Resolving the Remote Endpoint is not a local operation. It will | |||
involve a directory service, and can require communication with the | involve a directory service and can require communication with the | |||
Remote Endpoint to rendezvous and exchange peer addresses. This can | Remote Endpoint to rendezvous and exchange peer addresses. This can | |||
expose some or all of the candidate Local Endpoints to the Remote | expose some or all of the candidate Local Endpoints to the Remote | |||
Endpoint. | Endpoint. | |||
4.3. Candidate Racing | 4.3. Candidate Racing | |||
The primary goal of the Candidate Racing process is to successfully | The primary goal of the Candidate Racing process is to successfully | |||
negotiate a Protocol Stack to an endpoint over an interface to | negotiate a Protocol Stack to an endpoint over an interface to | |||
connect a single leaf node of the tree with as little delay and as | connect a single leaf node of the tree with as little delay and as | |||
few unnecessary connections attempts as possible. Optimizing these | few unnecessary connections attempts as possible. Optimizing these | |||
two factors improves the user experience, while minimizing network | two factors improves the user experience, while minimizing network | |||
load. | load. | |||
This section covers the dynamic aspect of connection establishment. | This section covers the dynamic aspect of connection establishment. | |||
The tree described above is a useful conceptual and architectural | The tree described above is a useful conceptual and architectural | |||
model. However, an implementation is unable to know all of the nodes | model. However, an implementation is unable to know all of the nodes | |||
that will be used until steps like name resolution have occurred, and | that will be used until steps like name resolution have occurred; | |||
many of the possible branches ultimately might not be attempted. | many of the possible branches ultimately might not be attempted. | |||
There are three different approaches to racing the attempts for | There are three different approaches to racing the attempts for | |||
different nodes of the connection establishment tree: | different nodes of the connection establishment tree: | |||
1. Simultaneous | 1. Simultaneous | |||
2. Staggered | 2. Staggered | |||
3. Failover | 3. Failover | |||
Each approach is appropriate in different use-cases and branch types. | Each approach is appropriate in different use cases and branch types. | |||
However, to avoid consuming unnecessary network resources, | However, to avoid consuming unnecessary network resources, | |||
implementations should not use simultaneous racing as a default | implementations should not use simultaneous racing as a default | |||
approach. | approach. | |||
The timing algorithms for racing should remain independent across | The timing algorithms for racing should remain independent across | |||
branches of the tree. Any timer or racing logic is isolated to a | branches of the tree. Any timer or racing logic is isolated to a | |||
given parent node, and is not ordered precisely with regards to | given parent node and is not ordered precisely with regard to | |||
children of other nodes. | children of other nodes. | |||
4.3.1. Simultaneous | 4.3.1. Simultaneous | |||
Simultaneous racing is when multiple alternate branches are started | Simultaneous racing is when multiple alternate branches are started | |||
without waiting for any one branch to make progress before starting | without waiting for any one branch to make progress before starting | |||
the next alternative. This means the attempts are effectively | the next alternative. This means the attempts are effectively | |||
simultaneous. Simultaneous racing should be avoided by | simultaneous. Simultaneous racing should be avoided by | |||
implementations, since it consumes extra network resources and | implementations since it consumes extra network resources and | |||
establishes state that might not be used. | establishes state that might not be used. | |||
4.3.2. Staggered | 4.3.2. Staggered | |||
Staggered racing can be used whenever a single node of the tree has | Staggered racing can be used whenever a single node of the tree has | |||
multiple child nodes. Based on the order determined when building | multiple child nodes. Based on the order determined when building | |||
the tree, the first child node will be initiated immediately, | the tree, the first child node will be initiated immediately, | |||
followed by the next child node after some delay. Once that second | followed by the next child node after some delay. Once that second | |||
child node is initiated, the third child node (if present) will begin | child node is initiated, the third child node (if present) will begin | |||
after another delay, and so on until all child nodes have been | after another delay, and so on until all child nodes have been | |||
initiated, or one of the child nodes successfully completes its | initiated or one of the child nodes successfully completes its | |||
negotiation. | negotiation. | |||
Staggered racing attempts can proceed in parallel. Implementations | Staggered racing attempts can proceed in parallel. Implementations | |||
should not terminate an earlier child connection attempt upon | should not terminate an earlier child connection attempt upon | |||
starting a secondary child. | starting a secondary child. | |||
If a child node fails to establish connectivity (as in Section 4.4.1) | If a child node fails to establish connectivity (as in Section 4.4.1) | |||
before the delay time has expired for the next child, the next child | before the delay time has expired for the next child, the next child | |||
should be started immediately. | should be started immediately. | |||
Staggered racing between IP addresses for a generic Connection should | Staggered racing between IP addresses for a generic Connection should | |||
follow the Happy Eyeballs algorithm described in [RFC8305]. | follow the Happy Eyeballs algorithm described in [RFC8305]. Guidance | |||
[RFC8421] provides guidance for racing when performing Interactive | for racing when performing ICE can be found in [RFC8421]. | |||
Connectivity Establishment (ICE). | ||||
Generally, the delay before starting a given child node ought to be | Generally, the delay before starting a given child node ought to be | |||
based on the length of time the previously started child node is | based on the length of time the previously started child node is | |||
expected to take before it succeeds or makes progress in connection | expected to take before it succeeds or makes progress in connection | |||
establishment. Algorithms like Happy Eyeballs choose a delay based | establishment. Algorithms like Happy Eyeballs choose a delay based | |||
on how long the transport connection handshake is expected to take. | on how long the transport connection handshake is expected to take. | |||
When performing staggered races in multiple branch types (such as | When performing staggered races in multiple branch types (such as | |||
racing between network interfaces, and then racing between IP | racing between network interfaces and then racing between IP | |||
addresses), a longer delay may be chosen for some branch types. For | addresses), a longer delay may be chosen for some branch types. For | |||
example, when racing between network interfaces, the delay should | example, when racing between network interfaces, the delay should | |||
also take into account the amount of time it takes to prepare the | also take into account the amount of time it takes to prepare the | |||
network interface (such as radio association) and name resolution | network interface (such as radio association) and name resolution | |||
over that interface, in addition to the delay that would be added for | over that interface in addition to the delay that would be added for | |||
a single transport connection handshake. | a single transport connection handshake. | |||
Since the staggered delay can be chosen based on dynamic information, | Since the staggered delay can be chosen based on dynamic information, | |||
such as predicted Round Trip Time, implementations should define | such as predicted RTT, implementations should define upper and lower | |||
upper and lower bounds for delay times. These bounds are | bounds for delay times. These bounds are implementation specific and | |||
implementation-specific, and may differ based on which branch type is | may differ based on which branch type is being used. | |||
being used. | ||||
4.3.3. Failover | 4.3.3. Failover | |||
If an implementation or application has a strong preference for one | If an implementation or application has a strong preference for one | |||
branch over another, the branching node may choose to wait until one | branch over another, the branching node may choose to wait until one | |||
child has failed before starting the next. Failure of a leaf node is | child has failed before starting the next. Failure of a leaf node is | |||
determined by its protocol negotiation failing or timing out; failure | determined by its protocol negotiation failing or timing out; failure | |||
of a parent branching node is determined by all of its children | of a parent branching node is determined by all of its children | |||
failing. | failing. | |||
An example in which failover is recommended is a race between a | An example in which failover is recommended is a race between a | |||
preferred Protocol Stack that uses a proxy and an alternate Protocol | preferred Protocol Stack that uses a proxy and an alternate Protocol | |||
Stack that bypasses the proxy. Failover is useful in case the proxy | Stack that bypasses the proxy. Failover is useful if the proxy is | |||
is down or misconfigured, but any more aggressive type of racing may | down or misconfigured, but any more aggressive type of racing may end | |||
end up unnecessarily avoiding a proxy that was preferred by policy. | up unnecessarily avoiding a proxy that was preferred by policy. | |||
4.4. Completing Establishment | 4.4. Completing Establishment | |||
The process of connection establishment completes when one leaf node | The process of connection establishment completes when one leaf node | |||
of the tree has successfully completed negotiation with the Remote | of the tree has successfully completed negotiation with the Remote | |||
Endpoint, or else all nodes of the tree have failed to connect. The | Endpoint, or else all nodes of the tree have failed to connect. The | |||
first leaf node to complete its connection is then used by the | first leaf node to complete its connection is then used by the | |||
application to send and receive data. This is signalled to the | application to send and receive data. This is signaled to the | |||
application using the Ready event in the API (Section 7.1 of | application using the Ready event in the API (Section 7.1 of | |||
[RFC9622]). | ||||
[I-D.ietf-taps-interface]). | ||||
Successes and failures of a given attempt should be reported up to | Successes and failures of a given attempt should be reported up to | |||
parent nodes (towards the root of the tree). For example, in the | parent nodes (toward the root of the tree). For example, in the | |||
following case, if 1.1.1 fails to connect, it reports the failure to | following case, if 1.1.1 fails to connect, it reports the failure to | |||
1.1. Since 1.1 has no other child nodes, it also has failed and | 1.1. Since 1.1 has no other child nodes, it also has failed and | |||
reports that failure to 1. Because 1.2 has not yet failed, 1 is not | reports that failure to 1. Because 1.2 has not yet failed, 1 is not | |||
considered to have failed. Since 1.2 has not yet started, it is | considered to have failed. Since 1.2 has not yet started, it is | |||
started and the process continues. Similarly, if 1.1.1 successfully | started and the process continues. Similarly, if 1.1.1 successfully | |||
connects, then it marks 1.1 as connected, which propagates to the | connects, then it marks 1.1 as connected, which propagates to the | |||
root node 1. At this point, the Connection as a whole is considered | root node 1. At this point, the Connection as a whole is considered | |||
to be successfully connected and ready to process application data. | to be successfully connected and ready to process application data. | |||
1 [www.example.com:443, Any, TCP] | 1 [www.example.com:443, Any, TCP] | |||
1.1 [www.example.com:443, Wi-Fi, TCP] | 1.1 [www.example.com:443, Wi-Fi, TCP] | |||
1.1.1 [192.0.2.1:443, Wi-Fi, TCP] | 1.1.1 [192.0.2.1:443, Wi-Fi, TCP] | |||
1.2 [www.example.com:443, LTE, TCP] | 1.2 [www.example.com:443, LTE, TCP] | |||
... | ... | |||
If a leaf node has successfully completed its connection, all other | If a leaf node has successfully completed its connection, all other | |||
attempts should be made ineligible for use by the application for the | attempts should be made ineligible for use by the application for the | |||
original request. New connection attempts that involve transmitting | original request. New connection attempts that involve transmitting | |||
data on the network ought not to be started after another leaf node | data on the network ought not to be started after another leaf node | |||
has already successfully completed, because the Connection as a whole | has already successfully completed because the Connection as a whole | |||
has now been established. An implementation could choose to let | has now been established. An implementation could choose to let | |||
certain handshakes and negotiations complete to gather metrics that | certain handshakes and negotiations complete to gather metrics that | |||
influence future connections. Keeping additional connections is | influence future connections. Keeping additional connections is | |||
generally not recommended, because those attempts were slower to | generally not recommended because those attempts were slower to | |||
connect and may exhibit less desirable properties. | connect and may exhibit less desirable properties. | |||
4.4.1. Determining Successful Establishment | 4.4.1. Determining Successful Establishment | |||
On a per-protocol basis, implementations may select different | On a per-protocol basis, implementations may select different | |||
criteria by which a leaf node is considered to be successfully | criteria by which a leaf node is considered to be successfully | |||
connected. If the only protocol being used is a transport protocol | connected. If the only protocol being used is a transport protocol | |||
with a clear handshake, like TCP, then the obvious choice is to | with a clear handshake, like TCP, then the obvious choice is to | |||
declare that node "connected" when the three-way handshake has been | declare that node "connected" when the three-way handshake completes. | |||
completed. If the only protocol being used is an connectionless | If the only protocol being used is a connectionless protocol, like | |||
protocol, like UDP, the implementation may consider the node fully | UDP, the implementation may consider the node fully "connected" the | |||
"connected" the moment it determines a route is present, before | moment it determines a route is present, before sending any packets | |||
sending any packets on the network, see further Section 4.6. | on the network, see further in Section 4.6. | |||
When the Initiate action is called without any Messages being sent at | When the Initiate action is called without any Messages being sent at | |||
the same time, depending on the protocols involved, it is not | the same time, depending on the protocols involved, it is not | |||
guaranteed that the Remote Endpoint will be notified of this, and | guaranteed that the Remote Endpoint will be notified; hence, a | |||
hence a passive endpoint's application may not receive a | passive endpoint's application may not receive a ConnectionReceived | |||
ConnectionReceived event until it receives the first Message on the | event until it receives the first Message on the new Connection. | |||
new Connection. | ||||
For Protocol Stacks with multiple handshakes, the decision becomes | For Protocol Stacks with multiple handshakes, the decision becomes | |||
more nuanced. If the Protocol Stack involves both TLS and TCP, an | more nuanced. If the Protocol Stack involves both TLS and TCP, an | |||
implementation could determine that a leaf node is connected after | implementation could determine that a leaf node is connected after | |||
the TCP handshake is complete, or it can wait for the TLS handshake | the TCP handshake is complete, or it can wait for the TLS handshake | |||
to complete as well. The benefit of declaring completion when the | to complete as well. The benefit of declaring completion when the | |||
TCP handshake finishes, and thus stopping the race for other branches | TCP handshake finishes, and thus stopping the race for other branches | |||
of the tree, is reduced burden on the network and Remote Endpoints | of the tree, is reduced burden on the network and Remote Endpoints | |||
from further connection attempts that are likely to be abandoned. On | from further connection attempts that are likely to be abandoned. On | |||
the other hand, by waiting until the TLS handshake is complete, an | the other hand, by waiting until the TLS handshake is complete, an | |||
implementation avoids the scenario in which a TCP handshake completes | implementation avoids the scenario in which a TCP handshake completes | |||
quickly, but TLS negotiation is either very slow or fails altogether | quickly, but TLS negotiation is either very slow or fails altogether | |||
in particular network conditions or to a particular endpoint. To | in particular network conditions or to a particular endpoint. To | |||
avoid the issue of TLS possibly failing, the implementation should | avoid the issue of TLS possibly failing, the implementation should | |||
not generate a Ready event for the Connection until the TLS handshake | not generate a Ready event for the Connection until the TLS handshake | |||
is complete. | is complete. | |||
If all of the leaf nodes fail to connect during racing, i.e. none of | If all of the leaf nodes fail to connect during racing, i.e., none of | |||
the configurations that satisfy all requirements given in the | the configurations that satisfy all requirements given in the | |||
Transport Properties actually work over the available paths, then the | Transport Properties actually work over the available paths, then the | |||
Transport Services system should report an EstablishmentError to the | Transport Services system should report an EstablishmentError to the | |||
application. An EstablishmentError event should also be generated in | application. An EstablishmentError event should also be generated if | |||
case the Transport Services system finds no usable candidates to | the Transport Services system finds no usable candidates to race. | |||
race. | ||||
4.5. Establishing multiplexed connections | 4.5. Establishing Multiplexed Connections | |||
Multiplexing several Connections over a single underlying transport | Multiplexing several Connections over a single underlying transport | |||
connection requires that the Connections to be multiplexed belong to | connection requires that the Connections to be multiplexed belong to | |||
the same Connection Group (as is indicated by the application using | the same Connection Group (as is indicated by the application using | |||
the Clone action). When the underlying transport connection supports | the Clone action). When the underlying transport connection supports | |||
multi-streaming, the Transport Services System can map each | multi-streaming, the Transport Services System can map each | |||
Connection in the Connection Group to a different stream of this | Connection in the Connection Group to a different stream of this | |||
connection. | connection. | |||
For such streams, there is often no explicit connection establishment | For such streams, there is often no explicit connection establishment | |||
procedure for the new stream prior to sending data on it (e.g., with | procedure for the new stream prior to sending data on it (e.g., with | |||
SCTP). In this case, the same considerations apply to determining | SCTP). In this case, the same considerations apply to determining | |||
stream establishment as apply to establishing a UDP connection, as | stream establishment as apply to establishing a UDP connection, as | |||
discussed in Section 4.4.1. This means that there might not be any | discussed in Section 4.4.1. This means that there might not be any | |||
"establishment" message (like a TCP SYN). | "establishment" message (like a TCP SYN). | |||
4.6. Handling connectionless protocols | 4.6. Handling Connectionless Protocols | |||
While protocols that use an explicit handshake to validate a | While protocols that use an explicit handshake to validate a | |||
connection to a peer can be used for racing multiple establishment | connection to a peer can be used for racing multiple establishment | |||
attempts in parallel, connectionless protocols such as raw UDP do not | attempts in parallel, connectionless protocols such as raw UDP do not | |||
offer a way to validate the presence of a peer or the usability of a | offer a way to validate the presence of a peer or the usability of a | |||
Connection without application feedback. An implementation should | Connection without application feedback. An implementation should | |||
consider such a Protocol Stack to be established as soon as the | consider such a Protocol Stack to be established as soon as the | |||
Transport Services system has selected a path on which to send data. | Transport Services system has selected a path on which to send data. | |||
However, this can cause a problem if a specific peer is not reachable | However, this can cause a problem if a specific peer is not reachable | |||
over the network using the connectionless protocol, or data cannot be | over the network using the connectionless protocol or data cannot be | |||
exchanged with the peer for any other reason. To handle the lack of | exchanged with the peer for any other reason. To handle the lack of | |||
an explicit handshake in the underlying protocol, an application can | an explicit handshake in the underlying protocol, an application can | |||
use a Message Framer (Section 6) on top of a connectionless protocol | use a Message Framer (Section 6) on top of a connectionless protocol | |||
to only mark a specific connection attempt as ready when some data | to only mark a specific connection attempt as ready when some data | |||
has been received, or after some application-level handshake has been | has been received or after some application-level handshake has been | |||
performed by the Message Framer. | performed by the Message Framer. | |||
4.7. Implementing Listeners | 4.7. Implementing Listeners | |||
When an implementation is asked to Listen, it registers with the | When an implementation is asked to Listen, it registers with the | |||
system to wait for incoming traffic to the Local Endpoint. If no | system to wait for incoming traffic to the Local Endpoint. If no | |||
Local Endpoint Identifer is specified, the implementation should use | Local Endpoint Identifier is specified, the implementation should use | |||
an ephemeral port. | an ephemeral port. | |||
If the Selection Properties do not require a single network interface | If the Selection Properties do not require a single network interface | |||
or path, but allow the use of multiple paths, the Listener object | or path but allow the use of multiple paths, the Listener object | |||
should register for incoming traffic on all of the network interfaces | should register for incoming traffic on all of the network interfaces | |||
or paths that conform to the Properties. The set of available paths | or paths that conform to the Properties. The set of available paths | |||
can change over time, so the implementation should monitor network | can change over time, so the implementation should monitor network | |||
path changes, and change the registration of the Listener across all | path changes and change the registration of the Listener across all | |||
usable paths as appropriate. When using multiple paths, the Listener | usable paths as appropriate. When using multiple paths, the Listener | |||
is generally expected to use the same port for listening on each. | is generally expected to use the same port for listening on each. | |||
If the Selection Properties allow multiple protocols to be used for | If the Selection Properties allow multiple protocols to be used for | |||
listening, and the implementation supports it, the Listener object | listening and the implementation supports it, the Listener object | |||
should support receiving inbound connections for each eligible | should support receiving inbound connections for each eligible | |||
protocol on each eligible path. | protocol on each eligible path. | |||
4.7.1. Implementing Listeners for Connected Protocols | 4.7.1. Implementing Listeners for Connected Protocols | |||
Connected protocols such as TCP and TLS-over-TCP have a strong | Connected protocols such as TCP and TLS-over-TCP have a strong | |||
mapping between the Local and Remote Endpoint Identifers (four-tuple) | mapping between the Local and Remote Endpoint Identifiers (four- | |||
and their protocol connection state. These map into Connection | tuple) and their protocol connection state. These map to Connection | |||
objects. Whenever a new inbound handshake is being started, the | objects. Whenever a new inbound handshake is being started, the | |||
Listener should generate a new Connection object and pass it to the | Listener should generate a new Connection object and pass it to the | |||
application. | application. | |||
4.7.2. Implementing Listeners for Connectionless Protocols | 4.7.2. Implementing Listeners for Connectionless Protocols | |||
Connectionless protocols such as UDP and UDP-lite generally do not | Connectionless protocols such as UDP and UDP-Lite generally do not | |||
provide the same mechanisms that connected protocols do to offer | provide the same mechanisms that Connected protocols do to offer | |||
Connection objects. Implementations should wait for incoming packets | Connection objects. Implementations should wait for incoming packets | |||
for connectionless protocols on a listening port and should perform | for connectionless protocols on a listening port and should perform | |||
four-tuple matching of packets to existing Connection objects if | four-tuple matching of packets to existing Connection objects if | |||
possible. If a matching Connection object does not exist, an | possible. If a matching Connection object does not exist, an | |||
incoming packet from a connectionless protocol should cause a new | incoming packet from a connectionless protocol should cause a new | |||
Connection object to be created. | Connection object to be created. | |||
4.7.3. Implementing Listeners for Multiplexed Protocols | 4.7.3. Implementing Listeners for Multiplexed Protocols | |||
Protocols that provide multiplexing of streams can listen for | Protocols that provide multiplexing of streams can listen for | |||
entirely new connections as well as for new sub-connections (streams | entirely new connections as well as for new subconnections (streams | |||
of an already existing connection). A new stream arrival on an | of an already-existing connection). A new stream arrival on an | |||
existing connection is presented to the application as a new | existing connection is presented to the application as a new | |||
Connection. This new Connection is grouped with all other | Connection. This new Connection is grouped with all other | |||
Connections that are multiplexed via the same protocol. | Connections that are multiplexed via the same protocol. | |||
5. Implementing Sending and Receiving Data | 5. Implementing Sending and Receiving Data | |||
The most basic mapping for sending a Message is an abstraction of | The most basic mapping for sending a Message is an abstraction of | |||
datagrams, in which the transport protocol naturally deals in | datagrams, in which the transport protocol naturally deals in | |||
discrete packets (such as UDP). Each Message here corresponds to a | discrete packets (such as UDP). Each Message here corresponds to a | |||
single datagram. | single datagram. | |||
skipping to change at page 23, line 42 ¶ | skipping to change at line 1056 ¶ | |||
For protocols that expose byte-streams (such as TCP), the only | For protocols that expose byte-streams (such as TCP), the only | |||
delineation provided by the protocol is the end of the stream in a | delineation provided by the protocol is the end of the stream in a | |||
given direction. Each Message in this case corresponds to the entire | given direction. Each Message in this case corresponds to the entire | |||
stream of bytes in a direction. These Messages may be quite long, in | stream of bytes in a direction. These Messages may be quite long, in | |||
which case they can be sent in multiple parts. | which case they can be sent in multiple parts. | |||
Protocols that provide framing (such as length-value protocols, or | Protocols that provide framing (such as length-value protocols, or | |||
protocols that use delimiters like HTTP/1.1) may support Message | protocols that use delimiters like HTTP/1.1) may support Message | |||
sizes that do not fit within a single datagram. Each Message for | sizes that do not fit within a single datagram. Each Message for | |||
framing protocols corresponds to a single frame, which may be sent | framing protocols corresponds to a single frame, which may be sent | |||
either as a complete Message in the underlying protocol, or in | either as a complete Message in the underlying protocol or in | |||
multiple parts. | multiple parts. | |||
Messages themselves generally consist of bytes passed in the | Messages themselves generally consist of bytes passed in the | |||
messageData parameter intended to be processed at an application | messageData parameter intended to be processed at an application | |||
layer. However, Message objects presented through the API can carry | layer. However, Message objects presented through the API can carry | |||
associated Message Properties passed through the messageContext | associated Message Properties passed through the messageContext | |||
parameter. When these are Protocol Specific Properties, they can | parameter. When these are Protocol-specific Properties, they can | |||
include metadata that exists separately from a byte encoding. For | include metadata that exists separately from a byte encoding. For | |||
example, these Properties can include name-value pairs of | example, these Properties can include name-value pairs of | |||
information, like HTTP header fields. In such cases, Messages might | information, like HTTP header fields. In such cases, Messages might | |||
be "empty", insofar as they contain zero bytes in the messageData | be "empty" insofar as they contain zero bytes in the messageData | |||
parameter, but can still include data in the messageContext that is | parameter, but they can still include data in the messageContext that | |||
interpreted by the Protocol Stack. | is interpreted by the Protocol Stack. | |||
5.1. Sending Messages | 5.1. Sending Messages | |||
The effect of the application sending a Message is determined by the | The effect of the application sending a Message is determined by the | |||
top-level protocol in the established Protocol Stack. That is, if | top-level protocol in the established Protocol Stack. That is, if | |||
the top-level protocol provides an abstraction of framed Messages | the top-level protocol provides an abstraction of framed Messages | |||
over a connection, the receiving application will be able to obtain | over a connection, the receiving application will be able to obtain | |||
multiple Messages on that connection, even if the framing protocol is | multiple Messages on that connection, even if the framing protocol is | |||
built on a byte-stream protocol like TCP. | built on a byte-stream protocol like TCP. | |||
5.1.1. Message Properties | 5.1.1. Message Properties | |||
The API allows various properties to be associated with each Message, | The API allows various properties to be associated with each Message, | |||
which should be implemented as discussed below. | which should be implemented as discussed below. | |||
* msgLifetime: this should be implemented by removing the Message | msgLifetime: this should be implemented by removing the Message from | |||
from the queue of pending Messages after the Lifetime has expired. | the queue of pending Messages after the Lifetime has expired. A | |||
A queue of pending Messages within the Transport Services | queue of pending Messages within the Transport Services | |||
Implementation that have yet to be handed to the Protocol Stack | Implementation that have yet to be handed to the Protocol Stack | |||
can always support this property, but once a Message has been sent | can always support this property, but once a Message has been sent | |||
into the send buffer of a protocol, only certain protocols may | into the send buffer of a protocol, only certain protocols may | |||
support removing it from their send buffer. For example, a | support removing it from their send buffer. For example, a | |||
Transport Services Implementation cannot remove bytes from a TCP | Transport Services Implementation cannot remove bytes from a TCP | |||
send buffer, while it can remove data from a SCTP send buffer | send buffer, while it can remove data from an SCTP send buffer | |||
using the partial reliability extension [RFC8303]. When there is | using the partial reliability extension [RFC8303]. When there is | |||
no standing queue of Messages within the system, and the Protocol | no standing queue of Messages within the system, and the Protocol | |||
Stack does not support the removal of a Message from the stack's | Stack does not support the removal of a Message from the stack's | |||
send buffer, this property may be ignored. | send buffer, this property may be ignored. | |||
* msgPriority: this represents the ability to prioritize a Message | msgPriority: this represents the ability to prioritize a Message | |||
over other Messages. This can be implemented by the Transport | over other Messages. This can be implemented by the Transport | |||
Services system by re-ordering Messages that have yet to be handed | Services system by reordering Messages that have yet to be handed | |||
to the Protocol Stack, or by giving relative priority hints to | to the Protocol Stack or by giving relative priority hints to | |||
protocols that support priorities per Message. For example, an | protocols that support priorities per Message. For example, an | |||
implementation of HTTP/2 could choose to send Messages of | implementation of HTTP/2 could choose to send Messages of | |||
different priority on streams of different priority. | different priority on streams of different priority. | |||
* msgOrdered: when this is false, this disables the requirement of | msgOrdered: When this is false, this disables the requirement of in- | |||
in-order-delivery for protocols that support configurable | order delivery for protocols that support configurable ordering. | |||
ordering. When the Protocol Stack does not support configurable | When the Protocol Stack does not support configurable ordering, | |||
ordering, this property may be ignored. | this property may be ignored. | |||
* safelyReplayable: when this is true, this means that the Message | safelyReplayable: When this is true, this means that the Message can | |||
can be used by a transport mechanism that might deliver it | be used by a transport mechanism that might deliver it multiple | |||
multiple times -- e.g., as a result of racing multiple transports | times -- e.g., as a result of racing multiple transports or as | |||
or as part of TCP Fast Open. Also, protocols that do not protect | part of TCP Fast Open (TFO). Also, protocols that do not protect | |||
against duplicated Messages, such as UDP (when used directly, | against duplicated Messages, such as UDP (when used directly, | |||
without a protocol layered atop), can only be used with Messages | without a protocol layered atop), can only be used with Messages | |||
that are Safely Replayable. When a Transport Services system is | that are Safely Replayable. When a Transport Services system is | |||
permitted to replay Messages, replay protection could be provided | permitted to replay Messages, replay protection could be provided | |||
by the application. | by the application. | |||
* final: when this is true, this means that the sender will not send | final: When this is true, this means that the sender will not send | |||
any further Messages. The Connection need not be closed (in case | any further Messages. The Connection need not be closed (if the | |||
the Protocol Stack supports half-close operation, like TCP). Any | Protocol Stack supports half-closed operations, like TCP). Any | |||
Messages sent after a Message marked final will result in a | Messages sent after a Message marked final will result in a | |||
SendError. | SendError. | |||
* msgChecksumLen: when this is set to any value other than Full | msgChecksumLen: When this is set to any value other than Full | |||
Coverage, it sets the minimum protection in protocols that allow | Coverage, it sets the minimum protection in protocols that allow | |||
limiting the checksum length (e.g. UDP-Lite). If the Protocol | limiting the checksum length (e.g., UDP-Lite). If the Protocol | |||
Stack does not support checksum length limitation, this property | Stack does not support checksum length limitation, this property | |||
may be ignored. | may be ignored. | |||
* msgReliable: When true, the property specifies that the Message | msgReliable: When true, the property specifies that the Message must | |||
must be reliably transmitted. When false, and if unreliable | be reliably transmitted. When false, and if unreliable | |||
transmission is supported by the underlying protocol, then the | transmission is supported by the underlying protocol, then the | |||
Message should be unreliably transmitted. If the underlying | Message should be unreliably transmitted. If the underlying | |||
protocol does not support unreliable transmission, the Message | protocol does not support unreliable transmission, the Message | |||
should be reliably transmitted. | should be reliably transmitted. | |||
* msgCapacityProfile: When true, this expresses a wish to override | msgCapacityProfile: When true, this expresses a wish to override the | |||
the Generic Connection Property connCapacityProfile for this | Generic Connection Property connCapacityProfile for this Message. | |||
Message. Depending on the value, this can, for example, be | Depending on the value, this can, for example, be implemented by | |||
implemented by changing the DSCP value of the associated packet | changing the Differentiated Services Code Point (DSCP) value of | |||
(note that the guidelines in Section 6 of [RFC7657] apply; e.g., | the associated packet (note that the guidelines in Section 6 of | |||
the DSCP value should not be changed for different packets within | [RFC7657] apply; for example, the DSCP value should not be changed | |||
a reliable transport protocol session or DCCP connection). | for different packets within a reliable transport protocol session | |||
or DCCP connection). | ||||
* noFragmentation: Setting this avoids network-layer fragmentation. | noFragmentation: Setting this avoids network-layer fragmentation. | |||
Messages exceeding the transport’s current estimate of its maximum | Messages exceeding the transport's current estimate of its maximum | |||
packet size (the singularTransmissionMsgMaxLen Connection | packet size (the singularTransmissionMsgMaxLen Connection | |||
Property) can result in transport segmentation when permitted, or | Property) can result in transport segmentation when permitted or | |||
generate an error. When used with transports running over IP | generate an error. When used with transports running over IPv4, | |||
version 4, the Don't Fragment bit should be set to avoid on-path | the Don't Fragment (DF) bit should be set to avoid on-path IP | |||
IP fragmentation ([RFC8304]). | fragmentation [RFC8304]. | |||
* noSegmentation: When set, this property limits the Message size to | noSegmentation: When set, this property limits the Message size to | |||
the transport’s current estimate of its maximum packet size (the | the transport's current estimate of its maximum packet size (the | |||
singularTransmissionMsgMaxLen Connection Property). Messages | singularTransmissionMsgMaxLen Connection Property). Messages | |||
larger than this size generate an error. Setting this avoids | larger than this size generate an error. Setting this avoids | |||
transport-layer segmentation and network-layer fragmentation. | transport-layer segmentation and network-layer fragmentation. | |||
When used with transports running over IP version 4, the Don't | When used with transports running over IPv4, the DF bit should be | |||
Fragment bit should be set to avoid on-path IP fragmentation | set to avoid on-path IP fragmentation ([RFC8304]). | |||
([RFC8304]). | ||||
5.1.2. Send Completion | 5.1.2. Send Completion | |||
The application should be notified (using a Sent, Expired or | The application should be notified (using a Sent, Expired, or | |||
SendError event) whenever a Message or partial Message has been | SendError event) whenever a Message or partial Message has been | |||
consumed by the Protocol Stack, or has failed to send. The time at | consumed by the Protocol Stack or has failed to send. The time at | |||
which a Message is considered to have been consumed by the Protocol | which a Message is considered to have been consumed by the Protocol | |||
Stack may vary depending on the protocol. For example, for a basic | Stack may vary depending on the protocol. For example, for a basic | |||
datagram protocol like UDP, this may correspond to the time when the | datagram protocol like UDP, this may correspond to the time when the | |||
packet is sent into the interface driver. For a protocol that | packet is sent into the interface driver. For a protocol that | |||
buffers data in queues, like TCP, this may correspond to when the | buffers data in queues, like TCP, this may correspond to when the | |||
data has entered the send buffer. The time at which a Message failed | data has entered the send buffer. The time at which a Message failed | |||
to send is when the Transport Services Implementation (including the | to send is when the Transport Services Implementation (including the | |||
Protocol Stack) has experienced a failure related to sending; this | Protocol Stack) has experienced a failure related to sending; this | |||
can depend on protocol-specific timeouts. | can depend on protocol-specific timeouts. | |||
skipping to change at page 26, line 43 ¶ | skipping to change at line 1195 ¶ | |||
switch between the application and the Transport Services System). | switch between the application and the Transport Services System). | |||
To avoid this, the application can indicate a batch of Send actions | To avoid this, the application can indicate a batch of Send actions | |||
through the API. When this is used, the implementation can defer the | through the API. When this is used, the implementation can defer the | |||
processing of Messages until the batch is complete. | processing of Messages until the batch is complete. | |||
5.2. Receiving Messages | 5.2. Receiving Messages | |||
Similar to sending, receiving a Message is determined by the top- | Similar to sending, receiving a Message is determined by the top- | |||
level protocol in the established Protocol Stack. The main | level protocol in the established Protocol Stack. The main | |||
difference with receiving is that the size and boundaries of the | difference with receiving is that the size and boundaries of the | |||
Message are not known beforehand. The application can communicate in | Message are not known beforehand. The application can communicate | |||
its Receive action the parameters for the Message, which can help the | the parameters for the Message in its Receive action, which can help | |||
Transport Services Implementation know how much data to deliver and | the Transport Services Implementation know how much data to deliver | |||
when. For example, if the application only wants to receive a | and when. For example, if the application only wants to receive a | |||
complete Message, the implementation should wait until an entire | complete Message, the implementation should wait until an entire | |||
Message (datagram, stream, or frame) is read before delivering any | Message (datagram, stream, or frame) is read before delivering any | |||
Message content to the application. This requires the implementation | Message content to the application. This requires the implementation | |||
to understand where Messages end, either via a supplied Message | to understand where Messages end, either via a supplied Message | |||
Framer or because the top-level protocol in the established Protocol | Framer or because the top-level protocol in the established Protocol | |||
Stack preserves message boundaries. The application can also control | Stack preserves message boundaries. The application can also control | |||
the flow of received data by specifying the minimum and maximum | the flow of received data by specifying the minimum and maximum | |||
number of bytes of Message content it wants to receive at one time. | number of bytes of Message content it wants to receive at one time. | |||
If a Connection finishes before a requested Receive action can be | If a Connection finishes before a requested Receive action can be | |||
satisfied, the Transport Services system should deliver any partial | satisfied, the Transport Services system should deliver any partial | |||
Message content outstanding, or if none is available, an indication | Message content outstanding, or if none is available, an indication | |||
that there will be no more received Messages. | that there will be no more received Messages. | |||
5.3. Handling of data for fast-open protocols | 5.3. Handling of Data for Fast-Open Protocols | |||
Several protocols allow sending higher-level protocol or application | Several protocols allow sending higher-level protocol or application | |||
data during their protocol establishment, such as TCP Fast Open | data during their protocol establishment, such as TFO [RFC7413] and | |||
[RFC7413] and TLS 1.3 [RFC8446]. This approach is referred to as | TLS 1.3 [RFC8446]. This approach is referred to as sending Zero-RTT | |||
sending Zero-RTT (0-RTT) data. This is a desirable feature, but | (0-RTT) data. This is a desirable feature, but it poses challenges | |||
poses challenges to an implementation that uses racing during | to an implementation that uses racing during connection | |||
connection establishment. | establishment. | |||
The application can express its preference for sending messagess as | The application can express its preference for sending messages as | |||
0-RTT data by using the zeroRttMsg Selection Property on the | 0-RTT data by using the zeroRttMsg Selection Property on the | |||
Preconnection. Then, the application can provide the message to send | Preconnection. Then, the application can provide the message to send | |||
as 0-RTT data via the InitiateWithSend action. In order to be sent | as 0-RTT data via the InitiateWithSend action. In order to be sent | |||
as 0-RTT data, the message needs to be marked with the | as 0-RTT data, the message needs to be marked with the | |||
safelyReplayable send paramteter. In general, 0-RTT data may be | safelyReplayable send parameter. In general, 0-RTT data may be | |||
replayed (for example, if a TCP SYN contains data, and the SYN is | replayed (for example, if a TCP SYN contains data, and the SYN is | |||
retransmitted, the data will be retransmitted as well but may be | retransmitted, the data will be retransmitted as well but may be | |||
considered as a new connection instead of a retransmission). When | considered a new connection instead of a retransmission). When | |||
racing connections, different leaf nodes have the opportunity to send | racing connections, different leaf nodes have the opportunity to send | |||
the same data independently. If data is truly safely replayable, | the same data independently. If data is truly safely replayable, | |||
this is permissible. | this is permissible. | |||
Once the application has provided its 0-RTT data, a Transport | Once the application has provided its 0-RTT data, a Transport | |||
Services Implementation should keep a copy of this data and provide | Services Implementation should keep a copy of this data and provide | |||
it to each new leaf node that is started and for which a protocol | it to each new leaf node that is started and for which a protocol | |||
instance supporting 0-RTT is being used. Note that the amount of | instance supporting 0-RTT is being used. Note that the amount of | |||
data that can actually be sent as 0-RTT data varies by protocol, so | data that can actually be sent as 0-RTT data varies by protocol, so | |||
any given Protocol Stack might only consume part of the saved data | any given Protocol Stack might only consume part of the saved data | |||
prior to becoming established. The implementation needs to keep | prior to becoming established. The implementation needs to keep | |||
track of how much data a particular Protocol Stack has consumed, and | track of how much data a particular Protocol Stack has consumed and | |||
ensure that any pending 0-RTT-eligible data from the application is | ensure that any pending 0-RTT-eligible data from the application is | |||
handled before subsequent Messages. | handled before subsequent Messages. | |||
It is also possible for Protocol Stacks within a particular leaf node | It is also possible for Protocol Stacks within a particular leaf node | |||
to use a 0-RTT handshakes in a lower-level protocol without any | to use a 0-RTT handshake in a lower-level protocol without any safely | |||
safely replayable application data if a higher-level protocol in the | replayable application data if a higher-level protocol in the stack | |||
stack has idempotent handshake data to send. For example, TCP Fast | has idempotent handshake data to send. For example, TFO could use a | |||
Open could use a Client Hello from TLS as its 0-RTT data, without any | Client Hello from TLS as its 0-RTT data without any data being | |||
data being provided by the application. | provided by the application. | |||
0-RTT handshakes often rely on previous state, such as TCP Fast Open | 0-RTT handshakes often rely on previous state, such as TFO cookies, | |||
cookies, previously established TLS tickets, or out-of-band | previously established TLS tickets, or out-of-band distributed pre- | |||
distributed pre-shared keys (PSKs). Implementations should be aware | shared keys (PSKs). Implementations should be aware of security | |||
of security concerns around using these tokens across multiple | concerns around using these tokens across multiple addresses or paths | |||
addresses or paths when racing. In the case of TLS, any given ticket | when racing. In the case of TLS, any given ticket or PSK should only | |||
or PSK should only be used on one leaf node, since servers will | be used on one leaf node, since servers will likely reject duplicate | |||
likely reject duplicate tickets in order to prevent replays (see | tickets in order to prevent replays (see Section 8.1 of [RFC8446]). | |||
Section 8.1 of [RFC8446]). If implementations have multiple tickets | If implementations have multiple tickets available from a previous | |||
available from a previous connection, each leaf node attempt can use | connection, each leaf node attempt can use a different ticket. In | |||
a different ticket. In effect, each leaf node will send the same | effect, each leaf node will send the same early application data, yet | |||
early application data, yet encoded (encrypted) differently on the | encoded (encrypted) differently on the wire. | |||
wire. | ||||
6. Implementing Message Framers | 6. Implementing Message Framers | |||
Message Framers are functions that define simple transformations | Message Framers are functions that define simple transformations | |||
between application Message data and raw transport protocol data. | between application Message data and raw transport protocol data. | |||
Generally, a Message Framer implements a simple application protocol | Generally, a Message Framer implements a simple application protocol | |||
that can either be provided by the Transport Services implementation | that can be provided either by the Transport Services implementation | |||
or by the application. It is optional for Transport Services system | or by the application. It is optional for Transport Services system | |||
implementations to provide Message Framers: the specification | implementations to provide Message Framers: the API specification | |||
[I-D.ietf-taps-interface] does not prescribe any particular Message | [RFC9622] does not prescribe any particular Message Framers to be | |||
Framers to be implemented. A Framer can encapsulate or encode | implemented. A Framer can encapsulate or encode outbound Messages, | |||
outbound Messages, decapsulate or decode inbound data into Messages, | decapsulate or decode inbound data into Messages, and implement parts | |||
and implement parts of protocols that do not directly map to | of protocols that do not directly map to application Messages (such | |||
application Messages (such as protocol handshakes or preludes before | as protocol handshakes or preludes before Message exchange). | |||
Message exchange). | ||||
While many protocols can be represented as Message Framers, for the | While many protocols can be represented as Message Framers, for the | |||
purposes of the Transport Services API, these are ways for | purposes of the Transport Services API, these are ways for | |||
applications or application frameworks to define their own Message | applications or application frameworks to define their own Message | |||
parsing to be included within a Connection's Protocol Stack. As an | parsing to be included within a Connection's Protocol Stack. As an | |||
example, TLS is a protocol that is by default built into the | example, TLS is a protocol that is by default built into the | |||
Transport Services API, even though it could also serve the purpose | Transport Services API, even though it could also serve the purpose | |||
of framing data over TCP. | of framing data over TCP. | |||
Most Message Framers fall into one of two categories: | Most Message Framers fall into one of two categories: | |||
* Header-prefixed record formats, such as a basic Type-Length-Value | * Header-prefixed record formats, such as a basic Type-Length-Value | |||
(TLV) structure | (TLV) structure | |||
* Delimiter-separated formats, such as HTTP/1.1 | * Delimiter-separated formats, such as HTTP/1.1 | |||
Common Message Framers can be provided by a Transport Services | Common Message Framers can be provided by a Transport Services | |||
Implementation, but an implementation ought to allow custom Message | Implementation, but an implementation ought to allow custom Message | |||
Framers to be defined by the application or some other piece of | Framers to be defined by the application or some other piece of | |||
software. This section describes one possible API for defining | software. This section describes one possible API for defining | |||
Message Framers, as an example. | Message Framers as an example. | |||
6.1. Defining Message Framers | 6.1. Defining Message Framers | |||
A Message Framer is primarily defined by the code that handles events | A Message Framer is primarily defined by the code that handles events | |||
for a framer implementation, specifically how it handles inbound and | for a framer implementation, specifically how it handles inbound and | |||
outbound data parsing. The function that implements custom framing | outbound data parsing. The function that implements custom framing | |||
logic will be referred to as the "framer implementation", which may | logic will be referred to as the "framer implementation", which may | |||
be provided by a Transport Services implementation or the application | be provided by a Transport Services implementation or the application | |||
itself. The Message Framer refers to the object or function within | itself. The Message Framer refers to the object or function within | |||
the main Connection implementation that delivers events to the custom | the main Connection implementation that delivers events to the custom | |||
framer implementation whenever data is ready to be parsed or framed. | framer implementation whenever data is ready to be parsed or framed. | |||
The API examples in this section use the notation conventions for the | The API examples in this section use the notation conventions for the | |||
Transport Services API defined in Section 1.1 of | Transport Services API defined in Section 1.1 of [RFC9622]. | |||
[I-D.ietf-taps-interface]. | ||||
The Transport Services Implementation needs to ensure that all of the | The Transport Services Implementation needs to ensure that all of the | |||
events and actions taken on a Message Framer are synchronized to | events and actions taken on a Message Framer are synchronized to | |||
ensure consistent behavior. For example, some of the actions defined | ensure consistent behavior. For example, some of the actions defined | |||
below (such as PrependFramer and StartPassthrough) modify how data | below (such as PrependFramer and StartPassthrough) modify how data | |||
flows in a protocol stack, and require synchronization with sending | flows in a Protocol Stack and require synchronization with sending | |||
and parsing data in the Message Framer. | and parsing data in the Message Framer. | |||
When a Connection establishment attempt begins, an event can be | When a Connection establishment attempt begins, an event can be | |||
delivered to notify the framer implementation that a new Connection | delivered to notify the framer implementation that a new Connection | |||
is being created. Similarly, a stop event can be delivered when a | is being created. Similarly, a stop event can be delivered when a | |||
Connection is being torn down. The framer implementation can use the | Connection is being torn down. The framer implementation can use the | |||
Connection object to look up specific properties of the Connection or | Connection object to look up specific properties of the Connection or | |||
the network being used that may influence how to frame Messages. | the network being used that may influence how to frame Messages. | |||
MessageFramer -> Start<connection> | MessageFramer -> Start<connection> | |||
skipping to change at page 30, line 4 ¶ | skipping to change at line 1342 ¶ | |||
implementation has the opportunity to start writing some data prior | implementation has the opportunity to start writing some data prior | |||
to the Connection delivering its Ready event. This allows the | to the Connection delivering its Ready event. This allows the | |||
implementation to communicate control data to the Remote Endpoint | implementation to communicate control data to the Remote Endpoint | |||
that can be used to parse Messages. | that can be used to parse Messages. | |||
Once the framer implementation has completed its setup or handshake, | Once the framer implementation has completed its setup or handshake, | |||
it can indicate to the application that it is ready for handling data | it can indicate to the application that it is ready for handling data | |||
with this call. | with this call. | |||
MessageFramer.MakeConnectionReady(connection) | MessageFramer.MakeConnectionReady(connection) | |||
Similarly, when a Message Framer generates a Stop event, the framer | Similarly, when a Message Framer generates a Stop event, the framer | |||
implementation has the opportunity to write some final data or clear | implementation has the opportunity to write some final data or clear | |||
up its local state before the Closed event is delivered to the | up its local state before the Closed event is delivered to the | |||
Application. The framer implementation can indicate that it has | application. The framer implementation can indicate that it has | |||
finished with this call. | finished with this call. | |||
MessageFramer.MakeConnectionClosed(connection) | MessageFramer.MakeConnectionClosed(connection) | |||
At any time if the implementation encounters a fatal error, it can | If the implementation encounters a fatal error at any time, it can | |||
also cause the Connection to fail and provide an error. | also cause the Connection to fail and provide an error. | |||
MessageFramer.FailConnection(connection, error) | MessageFramer.FailConnection(connection, error) | |||
Should the framer implementation deem the candidate selected during | Should the framer implementation deem the candidate selected during | |||
racing unsuitable, it can signal this to the Transport Services API | racing unsuitable, it can signal this to the Transport Services API | |||
by failing the Connection prior to marking it as ready. If there are | by failing the Connection prior to marking it as ready. If there are | |||
no other candidates available, the Connection will fail. Otherwise, | no other candidates available, the Connection will fail. Otherwise, | |||
the Connection will select a different candidate and the Message | the Connection will select a different candidate and the Message | |||
Framer will generate a new Start event. | Framer will generate a new Start event. | |||
skipping to change at page 30, line 42 ¶ | skipping to change at line 1381 ¶ | |||
A Message Framer might also choose to go into a passthrough mode once | A Message Framer might also choose to go into a passthrough mode once | |||
an initial exchange or handshake has been completed, such as the | an initial exchange or handshake has been completed, such as the | |||
STARTTLS case mentioned above. This can also be useful for proxy | STARTTLS case mentioned above. This can also be useful for proxy | |||
protocols like SOCKS [RFC1928] or HTTP CONNECT [RFC7230]. In such | protocols like SOCKS [RFC1928] or HTTP CONNECT [RFC7230]. In such | |||
cases, a Message Framer implementation can intercept sending and | cases, a Message Framer implementation can intercept sending and | |||
receiving of Messages at first, but then indicate that no more | receiving of Messages at first, but then indicate that no more | |||
processing is needed. | processing is needed. | |||
MessageFramer.StartPassthrough() | MessageFramer.StartPassthrough() | |||
6.2. Sender-side Message Framing | 6.2. Sender-Side Message Framing | |||
Message Framers generate an event whenever a Connection sends a new | Message Framers generate an event whenever a Connection sends a new | |||
Message. The parameters to the event align with the Send action in | Message. The parameters to the event align with the Send action in | |||
the API (Section 9.2 of [I-D.ietf-taps-interface]). | the API (Section 9.2 of [RFC9622]). | |||
MessageFramer | MessageFramer | |||
| | | | |||
V | V | |||
NewSentMessage<connection, messageData, messageContext, endOfMessage> | NewSentMessage<connection, messageData, messageContext, endOfMessage> | |||
Upon receiving this event, a framer implementation is responsible for | Upon receiving this event, a framer implementation is responsible for | |||
performing any necessary transformations and sending the resulting | performing any necessary transformations and sending the resulting | |||
data back to the Message Framer, which will in turn send it to the | data back to the Message Framer, which, in turn, will send it to the | |||
next protocol. To improve performance, implementations should ensure | next protocol. To improve performance, implementations should ensure | |||
that there is a way to pass the original data through without | that there is a way to pass the original data through without | |||
copying. | copying. | |||
MessageFramer.Send(connection, messageData) | MessageFramer.Send(connection, messageData) | |||
To provide an example, a simple protocol that adds the length of the | To provide an example, a simple protocol that adds the length of the | |||
Message data as a header would receive the NewSentMessage event, | Message data as a header would receive the NewSentMessage event, | |||
create a data representation of the length of the Message data, and | create a data representation of the length of the Message data, and | |||
then send a block of data that is the concatenation of the length | then send a block of data that is the concatenation of the length | |||
header and the original Message data. | header and the original Message data. | |||
6.3. Receiver-side Message Framing | 6.3. Receiver-Side Message Framing | |||
In order to parse a received flow of data into Messages, the Message | In order to parse a received flow of data into Messages, the Message | |||
Framer notifies the framer implementation whenever new data is | Framer notifies the framer implementation whenever new data is | |||
available to parse. | available to parse. | |||
The parameters to the events and calls for receiving data with a | The parameters to the events and calls for receiving data with a | |||
framer align with the Receive action in the API (Section 9.3 of | framer align with the Receive action in the API (Section 9.3 of | |||
[I-D.ietf-taps-interface]). | [RFC9622]). | |||
MessageFramer -> HandleReceivedData<connection> | MessageFramer -> HandleReceivedData<connection> | |||
Upon receiving this event, the framer implementation can inspect the | Upon receiving this event, the framer implementation can inspect the | |||
inbound data. The data is parsed from a particular cursor | inbound data. The data is parsed from a particular cursor | |||
representing the unprocessed data. The application requests a | representing the unprocessed data. The application requests a | |||
specific amount of data it needs to have available in order to parse. | specific amount of data it needs to have available in order to parse. | |||
If the data is not available, the parse fails. | If the data is not available, the parse fails. | |||
MessageFramer.Parse(connection, minimumIncompleteLength, maximumLength) | MessageFramer.Parse(connection, minimumIncompleteLength, maximumLength) | |||
| | | | |||
V | V | |||
(messageData, messageContext, endOfMessage) | (messageData, messageContext, endOfMessage) | |||
The framer implementation can directly advance the receive cursor | The framer implementation can directly advance the receive cursor | |||
once it has parsed data to effectively discard data (for example, | once it has parsed data to effectively discard data (for example, | |||
discard a header once the content has been parsed). | discard a header once the content has been parsed). | |||
To deliver a Message to the application, the framer implementation | To deliver a Message to the application, the framer implementation | |||
can either directly deliver data that it has allocated, or deliver a | can either directly deliver data that it has allocated or deliver a | |||
range of data directly from the underlying transport and | range of data directly from the underlying transport and | |||
simultaneously advance the receive cursor. | simultaneously advance the receive cursor. | |||
MessageFramer.AdvanceReceiveCursor(connection, length) | MessageFramer.AdvanceReceiveCursor(connection, length) | |||
MessageFramer.DeliverAndAdvanceReceiveCursor(connection, messageContext, length, endOfMessage) | MessageFramer.DeliverAndAdvanceReceiveCursor(connection, messageContext, length, endOfMessage) | |||
MessageFramer.Deliver(connection, messageContext, messageData, endOfMessage) | MessageFramer.Deliver(connection, messageContext, messageData, endOfMessage) | |||
Note that MessageFramer.DeliverAndAdvanceReceiveCursor allows the | Note that MessageFramer.DeliverAndAdvanceReceiveCursor allows the | |||
framer implementation to earmark bytes as part of a Message even | framer implementation to earmark bytes as part of a Message even | |||
before they are received by the transport. This allows the delivery | before they are received by the transport. This allows the delivery | |||
of very large Messages without requiring the implementation to | of very large Messages without requiring the implementation to | |||
directly inspect all of the bytes. | directly inspect all of the bytes. | |||
To provide an example, a simple protocol that parses the length of | To provide an example, a simple protocol that parses the length of | |||
the Message data as a header value would receive the | the Message data as a header value would receive the | |||
HandleReceivedData event, and call Parse with a minimum and maximum | HandleReceivedData event and call Parse with a minimum and maximum | |||
set to the length of the header field. Once the parse succeeded, it | set to the length of the header field. Once the parse succeeded, it | |||
would call AdvanceReceiveCursor with the length of the header field, | would call AdvanceReceiveCursor with the length of the header field | |||
and then call DeliverAndAdvanceReceiveCursor with the length of the | and then call DeliverAndAdvanceReceiveCursor with the length of the | |||
body that was parsed from the header, marking the new Message as | body that was parsed from the header, marking the new Message as | |||
complete. | complete. | |||
7. Implementing Connection Management | 7. Implementing Connection Management | |||
Once a Connection is established, the Transport Services API allows | Once a Connection is established, the Transport Services API allows | |||
applications to interact with the Connection by modifying or | applications to interact with the Connection by modifying or | |||
inspecting Connection Properties. A Connection can also generate | inspecting Connection Properties. A Connection can also generate | |||
error events in the form of SoftError events. | error events in the form of SoftError events. | |||
The set of Connection Properties that are supported for setting and | The set of Connection Properties that are supported for setting and | |||
getting on a Connection are described in [I-D.ietf-taps-interface]. | getting on a Connection are described in [RFC9622]. For any | |||
For any properties that are generic, and thus could apply to all | properties that are generic and, thus, could apply to all protocols | |||
protocols being used by a Connection, the Transport Services | being used by a Connection, the Transport Services Implementation | |||
Implementation should store the properties in storage common to all | should store the properties in storage common to all protocols and | |||
protocols, and notify the Protocol Stack as a whole whenever the | notify the Protocol Stack as a whole whenever the properties have | |||
properties have been modified by the application. [RFC8303] and | been modified by the application. [RFC8303] and [RFC8304] offer | |||
[RFC8304] offer guidance on how to do this for TCP, MPTCP, SCTP, UDP | guidance on how to do this for TCP, Multipath TCP (MPTCP), SCTP, UDP, | |||
and UDP-Lite; see Section 10 for a description of a back-tracking | and UDP-Lite; see Section 10 for a description of a backtracking | |||
method to find the relevant protocol primitives using these | method to find the relevant protocol primitives using these | |||
documents. For Protocol-specific Properties, such as the User | documents. For Protocol-specific Properties, such as the User | |||
Timeout that applies to TCP, the Transport Services Implementation | Timeout that applies to TCP, the Transport Services Implementation | |||
only needs to update the relevant protocol instance. | only needs to update the relevant protocol instance. | |||
Some Connection Properties might apply to multiple protocols within a | Some Connection Properties might apply to multiple protocols within a | |||
Protocol Stack. Depending on the specific property, it might be | Protocol Stack. Depending on the specific property, it might be | |||
appropriate to apply the property across multiple protocols | appropriate to apply the property across multiple protocols | |||
simultaneously, or else only apply it to one protocol. In general, | simultaneously or only apply it to one protocol. In general, the | |||
the Transport Services Implementation should allow the protocol | Transport Services Implementation should allow the protocol closest | |||
closest to the application to interpret Connection Properties, and | to the application to interpret Connection Properties and, | |||
potentially modify the set of Connection Properties passed down to | potentially, modify the set of Connection Properties passed down to | |||
the next protocol in the stack. For example, if the application has | the next protocol in the stack. For example, if the application has | |||
requested to use keepalives with the keepAlive property, and the | requested to use keepalives with the keepAlive property, and the | |||
Protocol Stack contains both HTTP/2 and TCP, the HTTP/2 protocol can | Protocol Stack contains both HTTP/2 and TCP, the HTTP/2 protocol can | |||
choose to enable its own keepalives to satisfy the application | choose to enable its own keepalives to satisfy the application | |||
request, and disable TCP-level keepalives. For cases where the | request and disable TCP-level keepalives. For cases where the | |||
application needs to have fine-grained per-protocol control, the | application needs to have fine-grained per-protocol control, the | |||
Transport Services Implementation can expose Protocol-specific | Transport Services Implementation can expose Protocol-specific | |||
Properties. | Properties. | |||
If an error is encountered in setting a property (for example, if the | If an error is encountered in setting a property (for example, if the | |||
application tries to set a TCP-specific property on a Connection that | application tries to set a TCP-specific property on a Connection that | |||
is not using TCP), the action must fail gracefully. The application | is not using TCP), the action must fail gracefully. The application | |||
must be informed of the error, but the Connection itself must not be | must be informed of the error but the Connection itself must not be | |||
terminated. | terminated. | |||
When protocol instances in the Protocol Stack report generic or | When protocol instances in the Protocol Stack report generic or | |||
protocol-specific errors, the API will deliver them to the | protocol-specific errors, the API will deliver them to the | |||
application as SoftError events. These allow the application to be | application as SoftError events. These allow the application to be | |||
informed of ICMP errors, and other similar events. | informed of ICMP errors and other similar events. | |||
7.1. Pooled Connection | 7.1. Pooled Connection | |||
For applications that do not need in-order delivery of Messages, the | For applications that do not need in-order delivery of Messages, the | |||
Transport Services Implementation may distribute Messages of a single | Transport Services Implementation may distribute Messages of a single | |||
Connection across several underlying transport connections or | Connection across several underlying transport connections or | |||
multiple streams of multi-streaming connections between endpoints, as | multiple streams of multi-streaming connections between endpoints, as | |||
long as all of these satisfy the Selection Properties. The Transport | long as all of these satisfy the Selection Properties. The Transport | |||
Services Implementation will then hide this connection management and | Services Implementation will then hide this connection management and | |||
only expose a single Connection object, which we here call a "Pooled | only expose a single Connection object, which we call a "Pooled | |||
Connection". This is in contrast to Connection Groups, which | Connection". This is in contrast to Connection Groups, which | |||
explicitly expose combined treatment of Connections, giving the | explicitly expose combined treatment of Connections, giving the | |||
application control over multiplexing, for example. | application control over multiplexing, for example. | |||
Pooled Connections can be useful when the application using the | Pooled Connections can be useful when the application using the | |||
Transport Services system implements a protocol such as HTTP, which | Transport Services system implements a protocol such as HTTP, which | |||
employs request/response pairs and does not require in-order delivery | employs request/response pairs and does not require in-order delivery | |||
of responses. This enables implementations of Transport Services | of responses. This enables implementations of Transport Services | |||
systems to realize transparent connection coalescing, connection | systems to realize transparent connection coalescing and connection | |||
migration, and to perform per-message endpoint and path selection by | migration and to perform per-message endpoint and path selection by | |||
choosing among multiple underlying connections. | choosing among multiple underlying connections. | |||
7.2. Handling Path Changes | 7.2. Handling Path Changes | |||
When a path change occurs, e.g., when the IP address of an interface | When a path change occurs, e.g., when the IP address of an interface | |||
changes or a new interface becomes available, the Transport Services | changes or a new interface becomes available, the Transport Services | |||
Implementation is responsible for notifying the Protocol Instance of | Implementation is responsible for notifying the Protocol Instance of | |||
the change. The path change may interrupt connectivity on a path for | the change. The path change may interrupt connectivity on a path for | |||
an active Connection or provide an opportunity for a transport that | an active Connection or provide an opportunity for a transport that | |||
supports multipath or migration to adapt to the new paths. Note | supports multipath or migration to adapt to the new paths. Note | |||
that, in the model of the Transport Services API, migration is | that, in the model of the Transport Services API, migration is | |||
considered a part of multipath connectivity; it is just a limiting | considered a part of multipath connectivity; it is just a limiting | |||
policy on multipath usage. If the multipath Selection Property is | policy on multipath usage. If the multipath Selection Property is | |||
set to Disabled, migration is disallowed. | set to Disabled, migration is disallowed. | |||
For protocols that do not support multipath or migration, the | For protocols that do not support multipath or migration, the | |||
Protocol Instances should be informed of the path change, but should | Protocol Instances should be informed of the path change but should | |||
not be forcibly disconnected if the previously used path becomes | not be forcibly disconnected if the previously used path becomes | |||
unavailable. There are many common usage scenarios that can lead to | unavailable. There are many common usage scenarios that can lead to | |||
a path becoming temporarily unavailable, and then recovering before | a path becoming temporarily unavailable and then recovering before | |||
the transport protocol reaches a timeout error. These are | the transport protocol reaches a timeout error. These are | |||
particularly common using mobile devices. Examples include: an | particularly common using mobile devices. Examples include: | |||
Ethernet cable becoming unplugged and then plugged back in; a device | ||||
losing a Wi-Fi signal while a user is in an elevator, and reattaching | * an Ethernet cable becoming unplugged and then plugged back in; | |||
when the user leaves the elevator; and a user losing the radio signal | ||||
while riding a train through a tunnel. If the device is able to | * a device losing a Wi-Fi signal while a user is in an elevator and | |||
rejoin a network with the same IP address, a stateful transport | reattaching when the user leaves the elevator; and | |||
connection can generally resume. Thus, while it is useful for a | ||||
Protocol Instance to be aware of a temporary loss of connectivity, | * a user losing the radio signal while riding a train through a | |||
the Transport Services Implementation should not aggressively close | tunnel. | |||
Connections in these scenarios. | ||||
If the device is able to rejoin a network with the same IP address, a | ||||
stateful transport connection can generally resume. Thus, while it | ||||
is useful for a Protocol Instance to be aware of a temporary loss of | ||||
connectivity, the Transport Services Implementation should not | ||||
aggressively close Connections in these scenarios. | ||||
If the Protocol Stack includes a transport protocol that supports | If the Protocol Stack includes a transport protocol that supports | |||
multipath connectivity, the Transport Services Implementation should | multipath connectivity, the Transport Services Implementation should | |||
also inform the Protocol Instance about potentially new paths that | also inform the Protocol Instance about potentially new paths that | |||
become permissible based on the multipath Selection Property and the | become permissible based on the multipath Selection Property and the | |||
multipathPolicy Connection Property choices made by the application. | multipathPolicy Connection Property choices made by the application. | |||
A protocol can then establish new subflows over new paths while an | A protocol can then establish new subflows over new paths while an | |||
active path is still available or, if migration is supported, also | active path is still available or, if migration is supported, also | |||
after a break has been detected, and should attempt to tear down | after a break has been detected, and should attempt to tear down | |||
subflows over paths that are no longer used. The Connection Property | subflows over paths that are no longer used. The Connection Property | |||
multipathPolicy of the Transport Services API allows an application | multipathPolicy of the Transport Services API allows an application | |||
to indicate when and how different paths should be used. However, | to indicate when and how different paths should be used. However, | |||
detailed handling of these policies is implementation-specific. For | detailed handling of these policies is implementation specific. For | |||
example, if the multipath Selection Property is set to active, the | example, if the multipath Selection Property is set to active, the | |||
decision about when to create a new path or to announce a new path or | decision about when to create a new path or to announce a new path or | |||
set of paths to the Remote Endpoint, e.g., in the form of additional | set of paths to the Remote Endpoint, e.g., in the form of additional | |||
IP addresses, is implementation-specific. If the Protocol Stack | IP addresses, is implementation specific. If the Protocol Stack | |||
includes a transport protocol that does not support multipath, but | includes a transport protocol that does not support multipath but | |||
does support migrating between paths, the update to the set of | does support migrating between paths, the update to the set of | |||
available paths can trigger the connection to be migrated. | available paths can trigger the connection to be migrated. | |||
In the case of a Pooled Connection Section 7.1, the Transport | In the case of a Pooled Connection (Section 7.1), the Transport | |||
Services Implementation may add connections over new paths to the | Services Implementation may add connections over new paths to the | |||
pool if permissible based on the multipath policy and Selection | pool if permissible based on the multipath policy and Selection | |||
Properties. In the case that a previously used path becomes | Properties. If a previously used path becomes unavailable, the | |||
unavailable, the Transport Services system may disconnect all | Transport Services system may disconnect all connections that require | |||
connections that require this path, but should not disconnect the | this path, but it should not disconnect the pooled Connection object | |||
pooled Connection object exposed to the application. The strategy to | exposed to the application. The strategy to do so is implementation | |||
do so is implementation-specific, but should be consistent with the | specific, but it should be consistent with the behavior of multipath | |||
behavior of multipath transports. | transports. | |||
8. Implementing Connection Termination | 8. Implementing Connection Termination | |||
For Close (which leads to a Closed event) and Abort (which leads to a | For Close (which leads to a Closed event) and Abort (which leads to a | |||
ConnectionError event), the application might find it useful to be | ConnectionError event), the application might find it useful to be | |||
informed when a peer closes or aborts a Connection. Whether this is | informed when a peer closes or aborts a Connection. Whether this is | |||
possible depends on the underlying protocol, and no guarantees can be | possible depends on the underlying protocol, and no guarantees can be | |||
given. When an underlying transport connection supports multi- | given. When an underlying transport connection supports multi- | |||
streaming (such as SCTP), the Transport Services system can use a | streaming (such as SCTP), the Transport Services system can use a | |||
stream reset procedure to cause a Finish event upon a Close action | stream reset procedure to cause a Finish event upon a Close action | |||
from the peer [NEAT-flow-mapping]. | from the peer [NEAT-flow-mapping]. | |||
9. Cached State | 9. Cached State | |||
Beyond a single Connection's lifetime, it is useful for an | Beyond a single Connection's lifetime, it is useful for an | |||
implementation to keep state and history. This cached state can help | implementation to keep state and history. This cached state can help | |||
improve future Connection establishment due to re-using results and | improve future Connection establishment due to reusing results and | |||
credentials, and favoring paths and protocols that performed well in | credentials and favoring paths and protocols that performed well in | |||
the past. | the past. | |||
Cached state may be associated with different endpoints for the same | Cached state may be associated with different endpoints for the same | |||
Connection, depending on the protocol generating the cached content. | Connection, depending on the protocol generating the cached content. | |||
For example, session tickets for TLS are associated with specific | For example, session tickets for TLS are associated with specific | |||
endpoints, and thus should be cached based on a connection's hostname | endpoints; thus, they should be cached based on a connection's | |||
Endpoint Identifer (if applicable). However, performance | hostname Endpoint Identifier (if applicable). However, performance | |||
characteristics of a path are more likely tied to the IP address and | characteristics of a path are more likely tied to the IP address and | |||
subnet being used. | subnet being used. | |||
9.1. Protocol state caches | 9.1. Protocol State Caches | |||
Some protocols will have long-term state to be cached in association | Some protocols will have long-term state to be cached in association | |||
with endpoints. This state often has some time after which it is | with endpoints. This state often has some time after which it is | |||
expired, so the implementation should allow each protocol to specify | expired, so the implementation should allow each protocol to specify | |||
an expiration for cached content. | an expiration for cached content. | |||
Examples of cached protocol state include: | Examples of cached protocol state include: | |||
* The DNS protocol can cache resolved addresses (such as those | * The DNS protocol can cache resolved addresses (such as those | |||
retrieved from A and AAAA queries), associated with a Time To Live | retrieved from A and AAAA queries) associated with a Time To Live | |||
(TTL) to be used for future hostname resolutions without requiring | (TTL) to be used for future hostname resolutions without requiring | |||
asking the DNS resolver again. | asking the DNS resolver again. | |||
* TLS caches session state and tickets based on a hostname, which | * TLS caches session state and tickets based on a hostname, which | |||
can be used for resuming sessions with a server. | can be used for resuming sessions with a server. | |||
* TCP can cache cookies for use in TCP Fast Open. | * TCP can cache cookies for use in TFO | |||
Cached protocol state is primarily used during Connection | Cached protocol state is primarily used during Connection | |||
establishment for a single Protocol Stack, but may be used to | establishment for a single Protocol Stack, but it may be used to | |||
influence an implementation's preference between several candidate | influence an implementation's preference between several candidate | |||
Protocol Stacks. For example, if two IP address Endpoint Identifers | Protocol Stacks. For example, if two IP address Endpoint Identifiers | |||
are otherwise equally preferred, an implementation may choose to | are otherwise equally preferred, an implementation may choose to | |||
attempt a connection to an address for which it has a TCP Fast Open | attempt a connection to an address for which it has a TFO cookie. | |||
cookie. | ||||
Applications can use the Transport Services API to request that a | Applications can use the Transport Services API to request that a | |||
Connection Group maintain a separate cache for protocol state. | Connection Group maintain a separate cache for protocol state. | |||
Connections in the group will not use cached state from Connections | Connections in the group will not use cached state from Connections | |||
outside the group, and Connections outside the group will not use | outside the group, and Connections outside the group will not use | |||
state cached from Connections inside the group. This may be | state cached from Connections inside the group. This may be | |||
necessary, for example, if application-layer identifiers rotate and | necessary, for example, if application-layer identifiers rotate and | |||
clients wish to avoid linkability via trackable TLS tickets or TFO | clients wish to avoid linkability via trackable TLS tickets or TFO | |||
cookies. | cookies. | |||
9.2. Performance caches | 9.2. Performance Caches | |||
In addition to protocol state, Protocol Instances should provide data | In addition to protocol state, Protocol Instances should provide data | |||
into a performance-oriented cache to help guide future protocol and | into a performance-oriented cache to help guide future protocol and | |||
path selection. Some performance information can be gathered | path selection. Some performance information can be gathered | |||
generically across several protocols to allow predictive comparisons | generically across several protocols to allow predictive comparisons | |||
between protocols on given paths: | between protocols on given paths: | |||
* Observed Round Trip Time | * Observed RTT | |||
* Connection establishment latency | * Connection establishment latency | |||
* Connection establishment success rate | * Connection establishment success rate | |||
These items can be cached on a per-address and per-subnet | These items can be cached on a per-address and per-subnet granularity | |||
granularity, and averaged between different values. The information | and averaged between different values. The information should be | |||
should be cached on a per-network basis, since it is expected that | cached on a per-network basis since it is expected that different | |||
different network attachments will have different performance | network attachments will have different performance characteristics. | |||
characteristics. Besides Protocol Instances, other system entities | Besides Protocol Instances, other system entities may also provide | |||
may also provide data into performance-oriented caches. This could | data into performance-oriented caches. This could for instance be | |||
for instance be signal strength information reported by radio modems | signal strength information reported by radio modems like Wi-Fi and | |||
like Wi-Fi and mobile broadband or information about the battery- | mobile broadband or information about the battery-level of the | |||
level of the device. Furthermore, the system may cache the observed | device. Furthermore, the system may cache the observed maximum | |||
maximum throughput on a path as an estimate of the available | throughput on a path as an estimate of the available bandwidth. | |||
bandwidth. | ||||
An implementation should use this information, when possible, to | An implementation should use this information, when possible, to | |||
influence preference between candidate paths, endpoints, and protocol | influence preference between candidate paths, endpoints, and protocol | |||
options. Eligible options that historically had significantly better | options. Eligible options that historically had significantly better | |||
performance than others should be selected first when gathering | performance than others should be selected first when gathering | |||
candidates (see Section 4.2) to ensure better performance for the | candidates (see Section 4.2) to ensure better performance for the | |||
application. | application. | |||
The reasonable lifetime for cached performance values will vary | The reasonable lifetime for cached performance values will vary | |||
depending on the nature of the value. Certain information, like the | depending on the nature of the value. Certain information, like the | |||
connection establishment success rate to a Remote Endpoint using a | connection establishment success rate to a Remote Endpoint using a | |||
given Protocol Stack, can be stored for a long period of time (hours | given Protocol Stack, can be stored for a long period of time (hours | |||
or longer), since it is expected that the capabilities of the Remote | or longer) since it is expected that the capabilities of the Remote | |||
Endpoint are not changing very quickly. On the other hand, the Round | Endpoint are not changing very quickly. On the other hand, the RTT | |||
Trip Time observed by TCP over a particular network path may vary | observed by TCP over a particular network path may vary over a | |||
over a relatively short time interval. For such values, the | relatively short time interval. For such values, the implementation | |||
implementation should remove them from the cache more quickly, or | should remove them from the cache more quickly or treat older values | |||
treat older values with less confidence/weight. | with less confidence/weight. | |||
[RFC9040] provides guidance about sharing of TCP Control Block | [RFC9040] provides guidance about sharing of TCP Control Block | |||
information between connections on initialization. | information between connections on initialization. | |||
10. Specific Transport Protocol Considerations | 10. Specific Transport Protocol Considerations | |||
Each protocol that is supported by a Transport Services | Each protocol that is supported by a Transport Services | |||
Implementation should have a well-defined API mapping. API mappings | Implementation should have a well-defined API mapping. API mappings | |||
for a protocol are important for Connections in which a given | for a protocol are important for Connections in which a given | |||
protocol is the "top" of the Protocol Stack. For example, the | protocol is the "top" of the Protocol Stack. For example, the | |||
mapping of the Send function for TCP applies to Connections in which | mapping of the Send function for TCP applies to Connections in which | |||
the application directly sends over TCP. | the application directly sends over TCP. | |||
Each protocol has a notion of Connectedness. Possible definitions of | Each protocol has a notion of "Connectedness". Possible definitions | |||
Connectedness for various types of protocols are: | of Connectedness for various types of protocols are: | |||
* Connectionless. Connectionless protocols do not establish | Connectionless: Connectionless protocols do not establish explicit | |||
explicit state between endpoints, and do not perform a handshake | state between endpoints and do not perform a handshake during | |||
during Connection establishment. | Connection establishment. | |||
* Connected. Connected (also called "connection-oriented") | Connected: Connected (also called "connection-oriented") protocols | |||
protocols establish state between endpoints, and perform a | establish state between endpoints and perform a handshake during | |||
handshake during connection establishment. The handshake may be | connection establishment. The handshake may be 0-RTT to send data | |||
0-RTT to send data or resume a session, but bidirectional traffic | or resume a session, but bidirectional traffic is required to | |||
is required to confirm connectedness. | confirm Connectedness. | |||
* Multiplexing Connected. Multiplexing Connected protocols share | Multiplexing Connected: Multiplexing Connected protocols share | |||
properties with Connected protocols, but also explictly support | properties with Connected protocols but also explicitly support | |||
opening multiple application-level flows. This means that they | opening multiple application-level flows. This means that they | |||
can support cloning new Connection objects without a new explicit | can support cloning new Connection objects without a new explicit | |||
handshake. | handshake. | |||
Protocols also have a notion of Data Unit. Possible values for Data | Protocols also have a notion of "Data Unit". Possible values for | |||
Unit are: | Data Unit are: | |||
* Byte-stream. Byte-stream protocols do not define any message | Byte-stream: Byte-stream protocols do not define any message | |||
boundaries of their own apart from the end of a stream in each | boundaries of their own apart from the end of a stream in each | |||
direction. | direction. | |||
* Datagram. Datagram protocols define message boundaries at the | Datagram: Datagram protocols define message boundaries at the same | |||
same level of transmission, such that only complete (not partial) | level of transmission, such that only complete (not partial) | |||
messages are supported. | messages are supported. | |||
* Message. Message protocols support message boundaries that can be | Message: Message protocols support message boundaries that can be | |||
sent and received either as complete or partial messages. Maximum | sent and received either as complete or partial messages. Maximum | |||
message lengths can be defined, and messages can be partially | message lengths can be defined, and messages can be partially | |||
reliable. | reliable. | |||
Below, terms in capitals with a dot (e.g., "CONNECT.SCTP") refer to | Below, terms in capitals with a dot character (".") (e.g., | |||
the primitives with the same name in Section 4 of [RFC8303]. For | "CONNECT.SCTP") refer to the primitives with the same name in | |||
further implementation details, the description of these primitives | Section 4 of [RFC8303]. For further implementation details, the | |||
in [RFC8303] points to Section 3 of [RFC8303] and Section 3 of | description of these primitives in [RFC8303] points to Section 3 of | |||
[RFC8304], which refers back to the relevant specifications for each | [RFC8303] and Section 3 of [RFC8304], which refers back to the | |||
protocol. This back-tracking method applies to all elements of | relevant specifications for each protocol. This backtracking method | |||
[RFC8923] (see appendix D of [I-D.ietf-taps-interface]): they are | applies to all elements of [RFC8923] (see Appendix D of [RFC9622]): | |||
listed in appendix A of [RFC8923] with an implementation hint in the | they are listed in Appendix A of [RFC8923] with an implementation | |||
same style, pointing back to Section 4 of [RFC8303]. | hint in the same style, pointing back to Section 4 of [RFC8303]. | |||
This document presents the protocol mappings defined in [RFC8923]. | This document presents the protocol mappings defined in [RFC8923]. | |||
Other protocol mappings can be provided as separate documents, | Other protocol mappings can be provided as separate documents, | |||
following the mapping template in Appendix A. | following the mapping template in Appendix A. | |||
10.1. TCP | 10.1. TCP | |||
Connectedness: Connected | Connectedness: Connected | |||
Data Unit: Byte-stream | Data Unit: Byte-stream | |||
Connection Object: TCP connections between two hosts map directly to | Connection Object: TCP connections between two hosts map directly to | |||
Connection objects. | Connection objects. | |||
Initiate: CONNECT.TCP. Calling Initiate on a TCP Connection causes | Initiate: CONNECT.TCP. Calling Initiate on a TCP Connection causes | |||
it to reserve a local port, and send a SYN to the Remote Endpoint. | it to reserve a local port and send a SYN to the Remote Endpoint. | |||
InitiateWithSend: CONNECT.TCP with parameter user message. Early | InitiateWithSend: CONNECT.TCP with parameter user message. Early | |||
safely replayable data is sent on a TCP Connection in the SYN, as | safely replayable data is sent on a TCP Connection in the SYN, as | |||
TCP Fast Open data. | TFO data. | |||
Ready: A TCP Connection is ready once the three-way handshake is | Ready: A TCP Connection is ready once the three-way handshake is | |||
complete. | complete. | |||
EstablishmentError: Failure of CONNECT.TCP. TCP can throw various | EstablishmentError: Failure of CONNECT.TCP. TCP can throw various | |||
errors during connection setup. Specifically, it is important to | errors during connection setup. Specifically, it is important to | |||
handle a RST being sent by the peer during the handshake. | handle a RST being sent by the peer during the handshake. | |||
ConnectionError: Once established, TCP throws errors whenever the | ConnectionError: Once established, TCP throws errors whenever the | |||
connection is disconnected, such as due to receiving a RST from | connection is disconnected, such as due to receiving a RST from | |||
skipping to change at page 39, line 24 ¶ | skipping to change at line 1798 ¶ | |||
ConnectionReceived: TCP Listeners will deliver new connections once | ConnectionReceived: TCP Listeners will deliver new connections once | |||
they have replied to an inbound SYN with a SYN-ACK. | they have replied to an inbound SYN with a SYN-ACK. | |||
Clone: Calling Clone on a TCP Connection creates a new Connection | Clone: Calling Clone on a TCP Connection creates a new Connection | |||
with equivalent parameters. These Connections, and Connections | with equivalent parameters. These Connections, and Connections | |||
generated via later calls to Clone on an Established Connection, | generated via later calls to Clone on an Established Connection, | |||
form a Connection Group. To realize entanglement for these | form a Connection Group. To realize entanglement for these | |||
Connections, with the exception of connPriority, changing a | Connections, with the exception of connPriority, changing a | |||
Connection Property on one of them must affect the Connection | Connection Property on one of them must affect the Connection | |||
Properties of the others too. No guarantees of honoring the | Properties of the others too. No guarantees of honoring the | |||
Connection Property connPriority are given, and thus it is safe | Connection Property connPriority are given; thus, it is safe for | |||
for an implementation of a Transport Services system to ignore | an implementation of a Transport Services system to ignore this | |||
this property. When it is reasonable to assume that Connections | property. When it is reasonable to assume that Connections | |||
traverse the same path (e.g., when they share the same | traverse the same path (e.g., when they share the same | |||
encapsulation), support for it can also experimentally be | encapsulation), support for it can also experimentally be | |||
implemented using a congestion control coupling mechanism (see for | implemented using a congestion control coupling mechanism (for | |||
example [TCP-COUPLING] or [RFC3124]). | example, see [TCP-COUPLING] or [RFC3124]). | |||
Send: SEND.TCP. TCP does not on its own preserve message | Send: SEND.TCP. On its own, TCP does not preserve message | |||
boundaries. Calling Send on a TCP connection lays out the bytes | boundaries. Calling Send on a TCP connection lays out the bytes | |||
on the TCP send stream without any other delineation. Any Message | on the TCP send stream without any other delineation. Any Message | |||
marked as Final will cause TCP to send a FIN once the Message has | marked as Final will cause TCP to send a FIN once the Message has | |||
been completely written, by calling CLOSE.TCP immediately upon | been completely written, by calling CLOSE.TCP immediately upon | |||
successful termination of SEND.TCP. Note that transmitting a | successful termination of SEND.TCP. Note that transmitting a | |||
Message marked as Final should not cause the Closed event to be | Message marked as Final should not cause the Closed event to be | |||
delivered to the application, as it will still be possible to | delivered to the application as it will still be possible to | |||
receive data until the peer closes or aborts the TCP connection. | receive data until the peer closes or aborts the TCP connection. | |||
Receive: With RECEIVE.TCP, TCP delivers a stream of bytes without | Receive: With RECEIVE.TCP, TCP delivers a stream of bytes without | |||
any Message delineation. All data delivered in the Received or | any Message delineation. All data delivered in the Received or | |||
ReceivedPartial event will be part of a single stream-wide Message | ReceivedPartial event will be part of a single stream-wide Message | |||
that is marked Final (unless a Message Framer is used). | that is marked Final (unless a Message Framer is used). | |||
EndOfMessage will be delivered when the TCP Connection has | EndOfMessage will be delivered when the TCP Connection has | |||
received a FIN (CLOSE-EVENT.TCP) from the peer. Note that | received a FIN (CLOSE-EVENT.TCP) from the peer. Note that | |||
reception of a FIN should not cause the Closed event to be | reception of a FIN should not cause the Closed event to be | |||
delivered to the application, as it will still be possible for the | delivered to the application, as it will still be possible for the | |||
skipping to change at page 40, line 25 ¶ | skipping to change at line 1846 ¶ | |||
CloseGroup: Calling CloseGroup on a TCP Connection (CLOSE.TCP) is | CloseGroup: Calling CloseGroup on a TCP Connection (CLOSE.TCP) is | |||
identical to calling Close on this Connection and on all | identical to calling Close on this Connection and on all | |||
Connections in the same ConnectionGroup. | Connections in the same ConnectionGroup. | |||
AbortGroup: Calling AbortGroup on a TCP Connection (ABORT.TCP) is | AbortGroup: Calling AbortGroup on a TCP Connection (ABORT.TCP) is | |||
identical to calling Abort on this Connection and on all | identical to calling Abort on this Connection and on all | |||
Connections in the same ConnectionGroup. | Connections in the same ConnectionGroup. | |||
10.2. MPTCP | 10.2. MPTCP | |||
Connectedness: Connected | Connectedness: Connected | |||
Data Unit: Byte-stream | Data Unit: Byte-stream | |||
The Transport Services API mappings for MPTCP are identical to TCP. | The Transport Services API mappings for MPTCP are identical to TCP. | |||
MPTCP adds support for multipath properties, such as multipath and | MPTCP adds support for multipath properties, such as multipath and | |||
multipathPolicy, and actions for managing paths, such as AddRemote | multipathPolicy, and actions for managing paths, such as AddRemote | |||
and RemoveRemote. | and RemoveRemote. | |||
10.3. UDP | 10.3. UDP | |||
Connectedness: Connectionless | Connectedness: Connectionless | |||
Data Unit: Datagram | Data Unit: Datagram | |||
Connection Object: UDP Connections represent a pair of specific IP | Connection Object: UDP Connections represent a pair of specific IP | |||
addresses and ports on two hosts. | addresses and ports on two hosts. | |||
Initiate: CONNECT.UDP. Calling Initiate on a UDP Connection causes | Initiate: CONNECT.UDP. Calling Initiate on a UDP Connection causes | |||
it to reserve a local port, but does not generate any traffic. | it to reserve a local port but does not generate any traffic. | |||
InitiateWithSend: Early data on a UDP Connection does not have any | InitiateWithSend: Early data on a UDP Connection does not have any | |||
special meaning. The data is sent whenever the Connection is | special meaning. The data is sent whenever the Connection is | |||
Ready. | Ready. | |||
Ready: A UDP Connection is ready once the system has reserved a | Ready: A UDP Connection is ready once the system has reserved a | |||
local port and has a path to send to the Remote Endpoint. | local port and has a path to send to the Remote Endpoint. | |||
EstablishmentError: UDP Connections can only generate errors on | EstablishmentError: UDP Connections can only generate errors on | |||
initiation due to port conflicts on the local system. | initiation due to port conflicts on the local system. | |||
skipping to change at page 41, line 27 ¶ | skipping to change at line 1896 ¶ | |||
they have received traffic from a new Remote Endpoint. | they have received traffic from a new Remote Endpoint. | |||
Clone: Calling Clone on a UDP Connection creates a new Connection | Clone: Calling Clone on a UDP Connection creates a new Connection | |||
with equivalent parameters. The two Connections are otherwise | with equivalent parameters. The two Connections are otherwise | |||
independent. | independent. | |||
Send: SEND.UDP. Calling Send on a UDP connection sends the data as | Send: SEND.UDP. Calling Send on a UDP connection sends the data as | |||
the payload of a complete UDP datagram. Marking Messages as Final | the payload of a complete UDP datagram. Marking Messages as Final | |||
does not change anything in the datagram's contents. Upon sending | does not change anything in the datagram's contents. Upon sending | |||
a UDP datagram, some relevant fields and flags in the IP header | a UDP datagram, some relevant fields and flags in the IP header | |||
can be controlled: DSCP (SET_DSCP.UDP), DF in IPv4 (SET_DF.UDP) | can be controlled: DSCP (SET_DSCP.UDP), DF in IPv4 (SET_DF.UDP), | |||
and ECN flag (SET_ECN.UDP). | and ECN flag (SET_ECN.UDP). | |||
Receive: RECEIVE.UDP. UDP only delivers complete Messages to | Receive: RECEIVE.UDP. UDP only delivers complete Messages to | |||
Received, each of which represents a single datagram received in a | Received, each of which represents a single datagram received in a | |||
UDP packet. Upon receiving a UDP datagram, the ECN flag from the | UDP packet. Upon receiving a UDP datagram, the ECN flag from the | |||
IP header can be obtained (GET_ECN.UDP). | IP header can be obtained (GET_ECN.UDP). | |||
Close: Calling Close on a UDP Connection (ABORT.UDP) releases the | Close: Calling Close on a UDP Connection (ABORT.UDP) releases the | |||
local port reservation. The Connection then issues a Closed | local port reservation. The Connection then issues a Closed | |||
event. | event. | |||
Abort: Calling Abort on a UDP Connection (ABORT.UDP) is identical to | Abort: Calling Abort on a UDP Connection (ABORT.UDP) is identical to | |||
calling Close, except that the Connection will send a | calling Close except that the Connection will send a | |||
ConnectionError event rather than a Closed event. | ConnectionError event rather than a Closed event. | |||
CloseGroup: Calling CloseGroup on a UDP Connection (ABORT.UDP) is | CloseGroup: Calling CloseGroup on a UDP Connection (ABORT.UDP) is | |||
identical to calling Close on this Connection and on all | identical to calling Close on this Connection and on all | |||
Connections in the same ConnectionGroup. | Connections in the same ConnectionGroup. | |||
AbortGroup: Calling AbortGroup on a UDP Connection (ABORT.UDP) is | AbortGroup: Calling AbortGroup on a UDP Connection (ABORT.UDP) is | |||
identical to calling Close on this Connection and on all | identical to calling Close on this Connection and on all | |||
Connections in the same ConnectionGroup. | Connections in the same ConnectionGroup. | |||
10.4. UDP-Lite | 10.4. UDP-Lite | |||
Connectedness: Connectionless | Connectedness: Connectionless | |||
Data Unit: Datagram | Data Unit: Datagram | |||
The Transport Services API mappings for UDP-Lite are identical to | The Transport Services API mappings for UDP-Lite are identical to | |||
UDP. In addition, UDP-Lite supports the msgChecksumLen and | UDP. In addition, UDP-Lite supports the msgChecksumLen and | |||
recvChecksumLen Properties that allow an application to specify the | recvChecksumLen Properties that allow an application to specify the | |||
minimum number of bytes in a Message that need to be covered by a | minimum number of bytes in a Message that need to be covered by a | |||
checksum. | checksum. | |||
This includes: CONNECT.UDP-Lite; LISTEN.UDP-Lite; SEND.UDP-Lite; | This includes: CONNECT.UDP-Lite; LISTEN.UDP-Lite; SEND.UDP-Lite; | |||
RECEIVE.UDP-Lite; ABORT.UDP-Lite; ERROR.UDP-Lite; SET_DSCP.UDP-Lite; | RECEIVE.UDP-Lite; ABORT.UDP-Lite; ERROR.UDP-Lite; SET_DSCP.UDP-Lite; | |||
SET_DF.UDP-Lite; SET_ECN.UDP-Lite; GET_ECN.UDP-Lite. | SET_DF.UDP-Lite; SET_ECN.UDP-Lite; GET_ECN.UDP-Lite. | |||
10.5. UDP Multicast Receive | 10.5. UDP Multicast Receive | |||
Connectedness: Connectionless | Connectedness: Connectionless | |||
Data Unit: Datagram | Data Unit: Datagram | |||
Connection Object: Established UDP Multicast Receive connections | Connection Object: Established UDP Multicast Receive connections | |||
represent a pair of specific IP addresses and ports. The | represent a pair of specific IP addresses and ports. The | |||
direction Selection Property must be set to unidirectional | direction Selection Property must be set to unidirectional | |||
receive, and the Local Endpoint must be configured with a group IP | receive, and the Local Endpoint must be configured with a group IP | |||
address and a port. | address and a port. | |||
Initiate: Calling Initiate on a UDP Multicast Receive Connection | Initiate: Calling Initiate on a UDP Multicast Receive Connection | |||
causes an immediate EstablishmentError. This is an unsupported | causes an immediate EstablishmentError. This is an unsupported | |||
operation. | operation. | |||
skipping to change at page 43, line 6 ¶ | skipping to change at line 1969 ¶ | |||
EstablishmentError: UDP Multicast Receive Connections generate an | EstablishmentError: UDP Multicast Receive Connections generate an | |||
EstablishmentError indicating that joining a multicast group | EstablishmentError indicating that joining a multicast group | |||
failed if Initiate is called. | failed if Initiate is called. | |||
ConnectionError: The only ConnectionError generated by a UDP | ConnectionError: The only ConnectionError generated by a UDP | |||
Multicast Receive Connection is in response to an Abort call. | Multicast Receive Connection is in response to an Abort call. | |||
Listen: LISTEN.UDP. Calling Listen for UDP Multicast Receive binds | Listen: LISTEN.UDP. Calling Listen for UDP Multicast Receive binds | |||
a local port, prepares it to receive inbound UDP datagrams from | a local port, prepares it to receive inbound UDP datagrams from | |||
peers, and issues a multicast host join. If a Remote Endpoint | peers, and issues a multicast host join. If a Remote Endpoint | |||
Identifer with an address is supplied, the join is Source-specific | Identifier with an address is supplied, the join is Source- | |||
Multicast, and the path selection is based on the route to the | Specific Multicast, and the path selection is based on the route | |||
Remote Endpoint. If a Remote Endpoint Identifer is not supplied, | to the Remote Endpoint. If a Remote Endpoint Identifier is not | |||
the join is Any-source Multicast, and the path selection is based | supplied, the join is Any-Source Multicast, and the path selection | |||
on the outbound route to the group supplied in the Local Endpoint. | is based on the outbound route to the group supplied in the Local | |||
Endpoint. | ||||
There are cases where it is required to open multiple connections for | There are cases where it is required to open multiple connections for | |||
the same address(es). For example, one Connection might be opened | the same address(es). For example, one Connection might be opened | |||
for a multicast group to for a multicast control bus, and another | for a multicast group to for a multicast control bus, and another | |||
application later opens a separate Connection to the same group to | application later opens a separate Connection to the same group to | |||
send signals to and/or receive signals from the common bus. In such | send signals to and/or receive signals from the common bus. In such | |||
cases, the Transport Services system needs to explicitly enable re- | cases, the Transport Services system needs to explicitly enable reuse | |||
use of the same set of addresses (equivalent to setting SO_REUSEADDR | of the same set of addresses (equivalent to setting SO_REUSEADDR in | |||
in the socket API). | the Socket API). | |||
ConnectionReceived: UDP Multicast Receive Listeners will deliver new | ConnectionReceived: UDP Multicast Receive Listeners will deliver new | |||
Connections once they have received traffic from a new Remote | Connections once they have received traffic from a new Remote | |||
Endpoint. | Endpoint. | |||
Clone: Calling Clone on a UDP Multicast Receive Connection creates a | Clone: Calling Clone on a UDP Multicast Receive Connection creates a | |||
new Connection with equivalent parameters. The two Connections | new Connection with equivalent parameters. The two Connections | |||
are otherwise independent. | are otherwise independent. | |||
Send: SEND.UDP. Calling Send on a UDP Multicast Receive connection | Send: SEND.UDP. Calling Send on a UDP Multicast Receive connection | |||
skipping to change at page 43, line 43 ¶ | skipping to change at line 2007 ¶ | |||
Receive connection only delivers complete Messages to Received, | Receive connection only delivers complete Messages to Received, | |||
each of which represents a single datagram received in a UDP | each of which represents a single datagram received in a UDP | |||
packet. Upon receiving a UDP datagram, the ECN flag from the IP | packet. Upon receiving a UDP datagram, the ECN flag from the IP | |||
header can be obtained (GET_ECN.UDP). | header can be obtained (GET_ECN.UDP). | |||
Close: Calling Close on a UDP Multicast Receive Connection | Close: Calling Close on a UDP Multicast Receive Connection | |||
(ABORT.UDP) releases the local port reservation and leaves the | (ABORT.UDP) releases the local port reservation and leaves the | |||
group. The Connection then issues a Closed event. | group. The Connection then issues a Closed event. | |||
Abort: Calling Abort on a UDP Multicast Receive Connection | Abort: Calling Abort on a UDP Multicast Receive Connection | |||
(ABORT.UDP) is identical to calling Close, except that the | (ABORT.UDP) is identical to calling Close except that the | |||
Connection will send a ConnectionError event rather than a Closed | Connection will send a ConnectionError event rather than a Closed | |||
event. | event. | |||
CloseGroup: Calling CloseGroup on a UDP Multicast Receive Connection | CloseGroup: Calling CloseGroup on a UDP Multicast Receive Connection | |||
(ABORT.UDP) is identical to calling Close on this Connection and | (ABORT.UDP) is identical to calling Close on this Connection and | |||
on all Connections in the same ConnectionGroup. | on all Connections in the same ConnectionGroup. | |||
AbortGroup: Calling AbortGroup on a UDP Multicast Receive Connection | AbortGroup: Calling AbortGroup on a UDP Multicast Receive Connection | |||
(ABORT.UDP) is identical to calling Close on this Connection and | (ABORT.UDP) is identical to calling Close on this Connection and | |||
on all Connections in the same ConnectionGroup. | on all Connections in the same ConnectionGroup. | |||
10.6. SCTP | 10.6. SCTP | |||
Connectedness: Connected | Connectedness: Connected | |||
Data Unit: Message | Data Unit: Message | |||
Connection Object: Connection objects can be mapped to an SCTP | Connection Object: Connection objects can be mapped to an SCTP | |||
association or a stream in an SCTP association. Mapping | association or a stream in an SCTP association. Mapping | |||
Connection objects to SCTP streams is called "stream mapping" and | Connection objects to SCTP streams is called "stream mapping" and | |||
has additional requirements as follows. The following explanation | has additional requirements as follows. The following explanation | |||
assumes a client-server communication model. | assumes a client-server communication model. | |||
Stream mapping requires an association to already be in place between | Stream mapping requires an association to already be in place between | |||
the client and the server, and it requires the server to understand | the client and the server, and it requires the server to understand | |||
that a new incoming stream should be represented as a new Connection | that a new incoming stream should be represented as a new Connection | |||
object by the Transport Services system. A new SCTP stream is | object by the Transport Services system. A new SCTP stream is | |||
created by sending an SCTP message with a new stream id. Thus, to | created by sending an SCTP message with a new stream id. Thus, to | |||
implement stream mapping, the Transport Services API must provide a | implement stream mapping, the Transport Services API must provide a | |||
newly created Connection object to the application upon the reception | newly created Connection object to the application upon the reception | |||
of such a message. The necessary semantics to implement a Transport | of such a message. The necessary semantics to implement a Transport | |||
Services system's Close and Abort primitives are provided by the | Services system's Close and Abort primitives are provided by the | |||
stream reconfiguration (reset) procedure described in [RFC6525]. | stream reconfiguration (reset) procedure described in [RFC6525]. | |||
This also allows to re-use a stream id after resetting ("closing") | This also allows a stream id to be reused after resetting ("closing") | |||
the stream. To implement this functionality, SCTP stream | the stream. To implement this functionality, SCTP stream | |||
reconfiguration [RFC6525] must be supported by both the client and | reconfiguration [RFC6525] must be supported by both the client and | |||
the server side. | the server side. | |||
To avoid head-of-line blocking, stream mapping should only be | To avoid head-of-line blocking, stream mapping should only be | |||
implemented when both sides support message interleaving [RFC8260]. | implemented when both sides support message interleaving [RFC8260]. | |||
This allows a sender to schedule transmissions between multiple | This allows a sender to schedule transmissions between multiple | |||
streams without risking that transmission of a large message on one | streams without risking that transmission of a large message on one | |||
stream might block transmissions on other streams for a long time. | stream might block transmissions on other streams for a long time. | |||
To avoid conflicts between stream ids, the following procedure is | To avoid conflicts between stream ids, the following procedure is | |||
recommended: the first Connection, for which the SCTP association has | recommended: the first Connection, for which the SCTP association has | |||
been created, must always use stream id zero. All additional | been created, must always use stream id zero. All additional | |||
Connections are assigned to unused stream ids in growing order. To | Connections are assigned to unused stream ids in growing order. To | |||
avoid a conflict when both endpoints map new Connections | avoid a conflict when both endpoints map new Connections | |||
simultaneously, the peer which initiated association must use even | simultaneously, the peer that initiated association must use even | |||
stream ids whereas the remote side must map its Connections to odd | stream ids whereas the remote side must map its Connections to odd | |||
stream ids. Both sides maintain a status map of the assigned stream | stream ids. Both sides maintain a status map of the assigned stream | |||
ids. Generally, new streams should consume the lowest available | ids. Generally, new streams should consume the lowest available | |||
(even or odd, depending on the side) stream id; this rule is relevant | (even or odd, depending on the side) stream id; this rule is relevant | |||
when lower ids become available because Connection objects associated | when lower ids become available because Connection objects associated | |||
with the streams are closed. | with the streams are closed. | |||
SCTP stream mapping as described here has been implemented in a | SCTP stream mapping as described here has been implemented in a | |||
research prototype; a desription of this implementation is given in | research prototype; a description of this implementation is given in | |||
[NEAT-flow-mapping]. | [NEAT-flow-mapping]. | |||
Initiate: If this is the only Connection object that is assigned to | Initiate: If this is the only Connection object that is assigned to | |||
the SCTP Association or stream mapping is not used, CONNECT.SCTP | the SCTP Association or stream mapping is not used, CONNECT.SCTP | |||
is called. Else, unless the Selection Property | is called. Else, unless the Selection Property | |||
activeReadBeforeSend is Preferred or Required, a new stream is | activeReadBeforeSend is Preferred or Required, a new stream is | |||
used: if there are enough streams available, Initiate is a local | used: if there are enough streams available, Initiate is a local | |||
operation that assigns a new stream id to the Connection object. | operation that assigns a new stream id to the Connection object. | |||
The number of streams is negotiated as a parameter of the prior | The number of streams is negotiated as a parameter of the prior | |||
CONNECT.SCTP call, and it represents a trade-off between local | CONNECT.SCTP call, and it represents a trade-off between local | |||
resource usage and the number of Connection objects that can be | resource usage and the number of Connection objects that can be | |||
mapped without requiring a reconfiguration signal. When running | mapped without requiring a reconfiguration signal. When running | |||
out of streams, ADD_STREAM.SCTP must be called. | out of streams, ADD_STREAM.SCTP must be called. | |||
InitiateWithSend: If this is the only Connection object that is | InitiateWithSend: If this is the only Connection object that is | |||
assigned to the SCTP association or stream mapping is not used, | assigned to the SCTP association or stream mapping is not used, | |||
CONNECT.SCTP is called with the "user message" parameter. Else, a | CONNECT.SCTP is called with the "user message" parameter. Else, a | |||
new stream is used (see Initiate for how to handle running out of | new stream is used (see Initiate for how to handle running out of | |||
streams), and this just sends the first message on a new stream. | streams), and this just sends the first message on a new stream. | |||
Ready: Initiate or InitiateWithSend returns without an error, i.e. | Ready: Initiate or InitiateWithSend returns without an error, i.e., | |||
SCTP's four-way handshake has completed. If an association with | SCTP's four-way handshake has completed. If an association with | |||
the peer already exists, stream mapping is used and enough streams | the peer already exists, stream mapping is used, and enough | |||
are available, a Connection object instantly becomes Ready after | streams are available, a Connection object instantly becomes Ready | |||
calling Initiate or InitiateWithSend. | after calling Initiate or InitiateWithSend. | |||
EstablishmentError: Failure of CONNECT.SCTP. | EstablishmentError: Failure of CONNECT.SCTP. | |||
ConnectionError: TIMEOUT.SCTP or ABORT-EVENT.SCTP. | ConnectionError: TIMEOUT.SCTP or ABORT-EVENT.SCTP. | |||
Listen: LISTEN.SCTP. If an association with the peer already exists | Listen: LISTEN.SCTP. If an association with the peer already exists | |||
and stream mapping is used, Listen just expects to receive a new | and stream mapping is used, Listen just expects to receive a new | |||
message with a new stream id (chosen in accordance with the stream | message with a new stream id (chosen in accordance with the stream | |||
id assignment procedure described above). | id assignment procedure described above). | |||
ConnectionReceived: LISTEN.SCTP returns without an error (a result | ConnectionReceived: LISTEN.SCTP returns without an error (a result | |||
of successful CONNECT.SCTP from the peer), or, in case of stream | of successful CONNECT.SCTP from the peer) or, in the case of | |||
mapping, the first message has arrived on a new stream (in this | stream mapping, the first message has arrived on a new stream (in | |||
case, Receive is also invoked). | this case, Receive is also invoked). | |||
Clone: Calling Clone on an SCTP association creates a new Connection | Clone: Calling Clone on an SCTP association creates a new Connection | |||
object and assigns it a new stream id in accordance with the | object and assigns it a new stream id in accordance with the | |||
stream id assignment procedure described above. If there are not | stream id assignment procedure described above. If there are not | |||
enough streams available, ADD_STREAM.SCTP must be called. | enough streams available, ADD_STREAM.SCTP must be called. | |||
Send: SEND.SCTP. Message Properties such as msgLifetime and | Send: SEND.SCTP. Message Properties such as msgLifetime and | |||
msgOrdered map to parameters of this primitive. | msgOrdered map to parameters of this primitive. | |||
Receive: RECEIVE.SCTP. The "partial flag" of RECEIVE.SCTP invokes a | Receive: RECEIVE.SCTP. The "partial flag" of RECEIVE.SCTP invokes a | |||
ReceivedPartial event. | ReceivedPartial event. | |||
Close: If this is the only Connection object that is assigned to the | Close: If this is the only Connection object that is assigned to the | |||
SCTP association, CLOSE.SCTP is called, and the Closed event will be | SCTP association, CLOSE.SCTP is called and the Closed event will | |||
delivered to the application upon the ensuing CLOSE-EVENT.SCTP. | be delivered to the application upon the ensuing CLOSE-EVENT.SCTP. | |||
Else, the Connection object is one out of several Connection objects | Else, the Connection object is one out of several Connection | |||
that are assigned to the same SCTP assocation, and RESET_STREAM.SCTP | objects that are assigned to the same SCTP association, and | |||
must be called, which informs the peer that the stream will no longer | RESET_STREAM.SCTP must be called, which informs the peer that the | |||
be used for mapping and can be used by future Initiate, | stream will no longer be used for mapping and can be used by | |||
InitiateWithSend or Listen calls. At the peer, the event | future Initiate, InitiateWithSend, or Listen calls. At the peer, | |||
RESET_STREAM-EVENT.SCTP will fire, which the peer must answer by | the event RESET_STREAM-EVENT.SCTP will fire, which the peer must | |||
issuing RESET_STREAM.SCTP too. The resulting local RESET_STREAM- | answer by issuing RESET_STREAM.SCTP too. The resulting local | |||
EVENT.SCTP informs the Transport Services system that the stream id | RESET_STREAM-EVENT.SCTP informs the Transport Services system that | |||
can now be re-used by the next Initiate, InitiateWithSend or Listen | the stream id can now be reused by the next Initiate, | |||
calls, and invokes a Closed event towards the application. | InitiateWithSend, or Listen calls, and invokes a Closed event | |||
toward the application. | ||||
Abort: If this is the only Connection object that is assigned to the | Abort: If this is the only Connection object that is assigned to the | |||
SCTP association, ABORT.SCTP is called. Else, the Connection object | SCTP association, ABORT.SCTP is called. Else, the Connection | |||
is one out of several Connection objects that are assigned to the | object is one out of several Connection objects that are assigned | |||
same SCTP assocation, and shutdown proceeds as described under Close. | to the same SCTP association, and shutdown proceeds as described | |||
under Close. | ||||
CloseGroup: Calling CloseGroup calls CLOSE.SCTP, closing all | CloseGroup: Calling CloseGroup calls CLOSE.SCTP, which closes all | |||
Connections in the SCTP association. | Connections in the SCTP association. | |||
AbortGroup: Calling AbortGroup calls ABORT.SCTP, immediately closing | AbortGroup: Calling AbortGroup calls ABORT.SCTP, which immediately | |||
all Connections in the SCTP association. | closes all Connections in the SCTP association. | |||
In addition to the API mappings described above, when there are | In addition to the API mappings described above, when there are | |||
multiple Connection objects assigned to the same SCTP association, | multiple Connection objects assigned to the same SCTP association, | |||
SCTP can support Connection properties such as connPriority and | SCTP can support Connection properties such as connPriority and | |||
connScheduler where CONFIGURE_STREAM_SCHEDULER.SCTP can be called to | connScheduler where CONFIGURE_STREAM_SCHEDULER.SCTP can be called to | |||
adjust the priorities of streams in the SCTP association. | adjust the priorities of streams in the SCTP association. | |||
11. IANA Considerations | 11. IANA Considerations | |||
This document has no actions for IANA. | This document has no IANA actions. | |||
12. Security Considerations | 12. Security Considerations | |||
[I-D.ietf-taps-arch] outlines general security consideration and | [RFC9621] outlines general security considerations and requirements | |||
requirements for any system that implements the Transport Services | for any system that implements the Transport Services architecture. | |||
archtecture. [I-D.ietf-taps-interface] provides further discussion | [RFC9622] provides further discussion on security and privacy | |||
on security and privacy implications of the Transport Services API. | implications of the Transport Services API. This document provides | |||
This document provides additional guidance on implementation | additional guidance on implementation specifics for the Transport | |||
specifics for the Transport Services API and as such the security | Services API; as such, the security considerations in both of these | |||
considerations in both of these documents apply. The next two | documents apply. The next two subsections discuss further | |||
subsections discuss further considerations that are specific to | considerations that are specific to mechanisms specified in this | |||
mechanisms specified in this document. | document. | |||
12.1. Considerations for Candidate Gathering | 12.1. Considerations for Candidate Gathering | |||
The Security Considerations of the Transport Services Architecture | The Security Considerations of the Transport Services architecture | |||
[I-D.ietf-taps-arch] forbids gathering and racing with Protocol | [RFC9621] forbids gathering and racing with Protocol Stacks that do | |||
Stacks that do not have equivalent security properties. Therefore, | not have equivalent security properties. Therefore, implementations | |||
implementations need to avoid downgrade attacks that allow network | need to avoid downgrade attacks that allow network interference to | |||
interference to cause the implementation to select less secure, or | cause the implementation to select less secure, or entirely insecure, | |||
entirely insecure, combinations of paths and protocols. | combinations of paths and protocols. | |||
12.2. Considerations for Candidate Racing | 12.2. Considerations for Candidate Racing | |||
See Section 5.3 for security considerations around racing with 0-RTT | See Section 5.3 for security considerations around racing with 0-RTT | |||
data. | data. | |||
An attacker that knows a particular device is racing several options | An attacker that knows a particular device is racing several options | |||
during connection establishment may be able to block packets for the | during connection establishment may be able to block packets for the | |||
first connection attempt, thus inducing the device to fall back to a | first connection attempt, thus inducing the device to fall back to a | |||
secondary attempt. This is a problem if the secondary attempts have | secondary attempt. This is a problem if the secondary attempts have | |||
skipping to change at page 47, line 38 ¶ | skipping to change at line 2197 ¶ | |||
security properties to avoid incentivizing attacks. | security properties to avoid incentivizing attacks. | |||
Since results from the network can determine how a connection attempt | Since results from the network can determine how a connection attempt | |||
tree is built, such as when DNS returns a list of resolved endpoints, | tree is built, such as when DNS returns a list of resolved endpoints, | |||
it is possible for the network to cause an implementation to consume | it is possible for the network to cause an implementation to consume | |||
significant on-device resources. Implementations should limit the | significant on-device resources. Implementations should limit the | |||
maximum amount of state allowed for any given node, including the | maximum amount of state allowed for any given node, including the | |||
number of child nodes, especially when the state is based on results | number of child nodes, especially when the state is based on results | |||
from the network. | from the network. | |||
13. Acknowledgements | 13. References | |||
This work has received funding from the European Union's Horizon 2020 | ||||
research and innovation programme under grant agreement No. 644334 | ||||
(NEAT) and No. 815178 (5GENESIS). | ||||
This work has been supported by Leibniz Prize project funds of DFG - | ||||
German Research Foundation: Gottfried Wilhelm Leibniz-Preis 2011 (FKZ | ||||
FE 570/4-1). | ||||
This work has been supported by the UK Engineering and Physical | ||||
Sciences Research Council under grant EP/R04144X/1. | ||||
This work has been supported by the Research Council of Norway under | ||||
its "Toppforsk" programme through the "OCARINA" project. | ||||
Thanks to Colin Perkins, Tom Jones, Karl-Johan Grinnemo, Gorry | ||||
Fairhurst, for their contributions to the design of this | ||||
specification. Thanks also to Stuart Cheshire, Josh Graessley, David | ||||
Schinazi, and Eric Kinnear for their implementation and design | ||||
efforts, including Happy Eyeballs, that heavily influenced this work. | ||||
14. References | ||||
14.1. Normative References | ||||
[I-D.ietf-taps-arch] | ||||
Pauly, T., Trammell, B., Brunstrom, A., Fairhurst, G., and | ||||
C. Perkins, "Architecture and Requirements for Transport | ||||
Services", Work in Progress, Internet-Draft, draft-ietf- | ||||
taps-arch-19, 9 November 2023, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-taps- | ||||
arch-19>. | ||||
[I-D.ietf-taps-interface] | 13.1. Normative References | |||
Trammell, B., Welzl, M., Enghardt, R., Fairhurst, G., | ||||
Kühlewind, M., Perkins, C., Tiesel, P. S., and T. Pauly, | ||||
"An Abstract Application Layer Interface to Transport | ||||
Services", Work in Progress, Internet-Draft, draft-ietf- | ||||
taps-interface-23, 14 November 2023, | ||||
<https://datatracker.ietf.org/doc/html/draft-ietf-taps- | ||||
interface-23>. | ||||
[RFC7413] Cheng, Y., Chu, J., Radhakrishnan, S., and A. Jain, "TCP | [RFC7413] Cheng, Y., Chu, J., Radhakrishnan, S., and A. Jain, "TCP | |||
Fast Open", RFC 7413, DOI 10.17487/RFC7413, December 2014, | Fast Open", RFC 7413, DOI 10.17487/RFC7413, December 2014, | |||
<https://www.rfc-editor.org/rfc/rfc7413>. | <https://www.rfc-editor.org/info/rfc7413>. | |||
[RFC7540] Belshe, M., Peon, R., and M. Thomson, Ed., "Hypertext | [RFC7540] Belshe, M., Peon, R., and M. Thomson, Ed., "Hypertext | |||
Transfer Protocol Version 2 (HTTP/2)", RFC 7540, | Transfer Protocol Version 2 (HTTP/2)", RFC 7540, | |||
DOI 10.17487/RFC7540, May 2015, | DOI 10.17487/RFC7540, May 2015, | |||
<https://www.rfc-editor.org/rfc/rfc7540>. | <https://www.rfc-editor.org/info/rfc7540>. | |||
[RFC8303] Welzl, M., Tuexen, M., and N. Khademi, "On the Usage of | [RFC8303] Welzl, M., Tuexen, M., and N. Khademi, "On the Usage of | |||
Transport Features Provided by IETF Transport Protocols", | Transport Features Provided by IETF Transport Protocols", | |||
RFC 8303, DOI 10.17487/RFC8303, February 2018, | RFC 8303, DOI 10.17487/RFC8303, February 2018, | |||
<https://www.rfc-editor.org/rfc/rfc8303>. | <https://www.rfc-editor.org/info/rfc8303>. | |||
[RFC8304] Fairhurst, G. and T. Jones, "Transport Features of the | [RFC8304] Fairhurst, G. and T. Jones, "Transport Features of the | |||
User Datagram Protocol (UDP) and Lightweight UDP (UDP- | User Datagram Protocol (UDP) and Lightweight UDP (UDP- | |||
Lite)", RFC 8304, DOI 10.17487/RFC8304, February 2018, | Lite)", RFC 8304, DOI 10.17487/RFC8304, February 2018, | |||
<https://www.rfc-editor.org/rfc/rfc8304>. | <https://www.rfc-editor.org/info/rfc8304>. | |||
[RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2: | [RFC8305] Schinazi, D. and T. Pauly, "Happy Eyeballs Version 2: | |||
Better Connectivity Using Concurrency", RFC 8305, | Better Connectivity Using Concurrency", RFC 8305, | |||
DOI 10.17487/RFC8305, December 2017, | DOI 10.17487/RFC8305, December 2017, | |||
<https://www.rfc-editor.org/rfc/rfc8305>. | <https://www.rfc-editor.org/info/rfc8305>. | |||
[RFC8421] Martinsen, P., Reddy, T., and P. Patil, "Guidelines for | [RFC8421] Martinsen, P., Reddy, T., and P. Patil, "Guidelines for | |||
Multihomed and IPv4/IPv6 Dual-Stack Interactive | Multihomed and IPv4/IPv6 Dual-Stack Interactive | |||
Connectivity Establishment (ICE)", BCP 217, RFC 8421, | Connectivity Establishment (ICE)", BCP 217, RFC 8421, | |||
DOI 10.17487/RFC8421, July 2018, | DOI 10.17487/RFC8421, July 2018, | |||
<https://www.rfc-editor.org/rfc/rfc8421>. | <https://www.rfc-editor.org/info/rfc8421>. | |||
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | |||
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | |||
<https://www.rfc-editor.org/rfc/rfc8446>. | <https://www.rfc-editor.org/info/rfc8446>. | |||
[RFC8923] Welzl, M. and S. Gjessing, "A Minimal Set of Transport | [RFC8923] Welzl, M. and S. Gjessing, "A Minimal Set of Transport | |||
Services for End Systems", RFC 8923, DOI 10.17487/RFC8923, | Services for End Systems", RFC 8923, DOI 10.17487/RFC8923, | |||
October 2020, <https://www.rfc-editor.org/rfc/rfc8923>. | October 2020, <https://www.rfc-editor.org/info/rfc8923>. | |||
14.2. Informative References | [RFC9621] Pauly, T., Ed., Trammell, B., Ed., Brunstrom, A., | |||
Fairhurst, G., and C. S. Perkins, "Architecture and | ||||
Requirements for Transport Services", RFC 9621, | ||||
DOI 10.17487/RFC9621, November 2024, | ||||
<https://www.rfc-editor.org/info/rfc9621>. | ||||
[I-D.ietf-dnsop-svcb-https] | [RFC9622] Trammell, B., Ed., Welzl, M., Ed., Enghardt, R., | |||
Schwartz, B. M., Bishop, M., and E. Nygren, "Service | Fairhurst, G., Kühlewind, M., Perkins, C. S., Tiesel, P. | |||
Binding and Parameter Specification via the DNS (SVCB and | S., and T. Pauly, "The Transport Services Application | |||
HTTPS Resource Records)", Work in Progress, Internet- | Programming Interface", RFC 9622, DOI 10.17487/RFC9622, | |||
Draft, draft-ietf-dnsop-svcb-https-12, 11 March 2023, | November 2024, <https://www.rfc-editor.org/info/rfc9622>. | |||
<https://datatracker.ietf.org/doc/html/draft-ietf-dnsop- | ||||
svcb-https-12>. | 13.2. Informative References | |||
[NEAT-flow-mapping] | [NEAT-flow-mapping] | |||
"Transparent Flow Mapping for NEAT", IFIP NETWORKING 2017 | Weinrank, F. and M. Tuxen, "Transparent flow mapping for | |||
Workshop on Future of Internet Transport (FIT 2017) , | NEAT", 2017 IFIP Networking Conference (IFIP Networking) | |||
2017. | and Workshops, DOI 10.23919/IFIPNetworking.2017.8264876, | |||
June 2017, <https://ieeexplore.ieee.org/document/8264876>. | ||||
[RFC1928] Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., and | [RFC1928] Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., and | |||
L. Jones, "SOCKS Protocol Version 5", RFC 1928, | L. Jones, "SOCKS Protocol Version 5", RFC 1928, | |||
DOI 10.17487/RFC1928, March 1996, | DOI 10.17487/RFC1928, March 1996, | |||
<https://www.rfc-editor.org/rfc/rfc1928>. | <https://www.rfc-editor.org/info/rfc1928>. | |||
[RFC2782] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for | [RFC2782] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for | |||
specifying the location of services (DNS SRV)", RFC 2782, | specifying the location of services (DNS SRV)", RFC 2782, | |||
DOI 10.17487/RFC2782, February 2000, | DOI 10.17487/RFC2782, February 2000, | |||
<https://www.rfc-editor.org/rfc/rfc2782>. | <https://www.rfc-editor.org/info/rfc2782>. | |||
[RFC3124] Balakrishnan, H. and S. Seshan, "The Congestion Manager", | [RFC3124] Balakrishnan, H. and S. Seshan, "The Congestion Manager", | |||
RFC 3124, DOI 10.17487/RFC3124, June 2001, | RFC 3124, DOI 10.17487/RFC3124, June 2001, | |||
<https://www.rfc-editor.org/rfc/rfc3124>. | <https://www.rfc-editor.org/info/rfc3124>. | |||
[RFC3207] Hoffman, P., "SMTP Service Extension for Secure SMTP over | [RFC3207] Hoffman, P., "SMTP Service Extension for Secure SMTP over | |||
Transport Layer Security", RFC 3207, DOI 10.17487/RFC3207, | Transport Layer Security", RFC 3207, DOI 10.17487/RFC3207, | |||
February 2002, <https://www.rfc-editor.org/rfc/rfc3207>. | February 2002, <https://www.rfc-editor.org/info/rfc3207>. | |||
[RFC5389] Rosenberg, J., Mahy, R., Matthews, P., and D. Wing, | [RFC5389] Rosenberg, J., Mahy, R., Matthews, P., and D. Wing, | |||
"Session Traversal Utilities for NAT (STUN)", RFC 5389, | "Session Traversal Utilities for NAT (STUN)", RFC 5389, | |||
DOI 10.17487/RFC5389, October 2008, | DOI 10.17487/RFC5389, October 2008, | |||
<https://www.rfc-editor.org/rfc/rfc5389>. | <https://www.rfc-editor.org/info/rfc5389>. | |||
[RFC5766] Mahy, R., Matthews, P., and J. Rosenberg, "Traversal Using | [RFC5766] Mahy, R., Matthews, P., and J. Rosenberg, "Traversal Using | |||
Relays around NAT (TURN): Relay Extensions to Session | Relays around NAT (TURN): Relay Extensions to Session | |||
Traversal Utilities for NAT (STUN)", RFC 5766, | Traversal Utilities for NAT (STUN)", RFC 5766, | |||
DOI 10.17487/RFC5766, April 2010, | DOI 10.17487/RFC5766, April 2010, | |||
<https://www.rfc-editor.org/rfc/rfc5766>. | <https://www.rfc-editor.org/info/rfc5766>. | |||
[RFC6525] Stewart, R., Tuexen, M., and P. Lei, "Stream Control | [RFC6525] Stewart, R., Tuexen, M., and P. Lei, "Stream Control | |||
Transmission Protocol (SCTP) Stream Reconfiguration", | Transmission Protocol (SCTP) Stream Reconfiguration", | |||
RFC 6525, DOI 10.17487/RFC6525, February 2012, | RFC 6525, DOI 10.17487/RFC6525, February 2012, | |||
<https://www.rfc-editor.org/rfc/rfc6525>. | <https://www.rfc-editor.org/info/rfc6525>. | |||
[RFC6762] Cheshire, S. and M. Krochmal, "Multicast DNS", RFC 6762, | [RFC6762] Cheshire, S. and M. Krochmal, "Multicast DNS", RFC 6762, | |||
DOI 10.17487/RFC6762, February 2013, | DOI 10.17487/RFC6762, February 2013, | |||
<https://www.rfc-editor.org/rfc/rfc6762>. | <https://www.rfc-editor.org/info/rfc6762>. | |||
[RFC6763] Cheshire, S. and M. Krochmal, "DNS-Based Service | [RFC6763] Cheshire, S. and M. Krochmal, "DNS-Based Service | |||
Discovery", RFC 6763, DOI 10.17487/RFC6763, February 2013, | Discovery", RFC 6763, DOI 10.17487/RFC6763, February 2013, | |||
<https://www.rfc-editor.org/rfc/rfc6763>. | <https://www.rfc-editor.org/info/rfc6763>. | |||
[RFC7230] Fielding, R., Ed. and J. Reschke, Ed., "Hypertext Transfer | [RFC7230] Fielding, R., Ed. and J. Reschke, Ed., "Hypertext Transfer | |||
Protocol (HTTP/1.1): Message Syntax and Routing", | Protocol (HTTP/1.1): Message Syntax and Routing", | |||
RFC 7230, DOI 10.17487/RFC7230, June 2014, | RFC 7230, DOI 10.17487/RFC7230, June 2014, | |||
<https://www.rfc-editor.org/rfc/rfc7230>. | <https://www.rfc-editor.org/info/rfc7230>. | |||
[RFC7657] Black, D., Ed. and P. Jones, "Differentiated Services | [RFC7657] Black, D., Ed. and P. Jones, "Differentiated Services | |||
(Diffserv) and Real-Time Communication", RFC 7657, | (Diffserv) and Real-Time Communication", RFC 7657, | |||
DOI 10.17487/RFC7657, November 2015, | DOI 10.17487/RFC7657, November 2015, | |||
<https://www.rfc-editor.org/rfc/rfc7657>. | <https://www.rfc-editor.org/info/rfc7657>. | |||
[RFC8085] Eggert, L., Fairhurst, G., and G. Shepherd, "UDP Usage | [RFC8085] Eggert, L., Fairhurst, G., and G. Shepherd, "UDP Usage | |||
Guidelines", BCP 145, RFC 8085, DOI 10.17487/RFC8085, | Guidelines", BCP 145, RFC 8085, DOI 10.17487/RFC8085, | |||
March 2017, <https://www.rfc-editor.org/rfc/rfc8085>. | March 2017, <https://www.rfc-editor.org/info/rfc8085>. | |||
[RFC8260] Stewart, R., Tuexen, M., Loreto, S., and R. Seggelmann, | [RFC8260] Stewart, R., Tuexen, M., Loreto, S., and R. Seggelmann, | |||
"Stream Schedulers and User Message Interleaving for the | "Stream Schedulers and User Message Interleaving for the | |||
Stream Control Transmission Protocol", RFC 8260, | Stream Control Transmission Protocol", RFC 8260, | |||
DOI 10.17487/RFC8260, November 2017, | DOI 10.17487/RFC8260, November 2017, | |||
<https://www.rfc-editor.org/rfc/rfc8260>. | <https://www.rfc-editor.org/info/rfc8260>. | |||
[RFC8445] Keranen, A., Holmberg, C., and J. Rosenberg, "Interactive | [RFC8445] Keranen, A., Holmberg, C., and J. Rosenberg, "Interactive | |||
Connectivity Establishment (ICE): A Protocol for Network | Connectivity Establishment (ICE): A Protocol for Network | |||
Address Translator (NAT) Traversal", RFC 8445, | Address Translator (NAT) Traversal", RFC 8445, | |||
DOI 10.17487/RFC8445, July 2018, | DOI 10.17487/RFC8445, July 2018, | |||
<https://www.rfc-editor.org/rfc/rfc8445>. | <https://www.rfc-editor.org/info/rfc8445>. | |||
[RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | |||
Multiplexed and Secure Transport", RFC 9000, | Multiplexed and Secure Transport", RFC 9000, | |||
DOI 10.17487/RFC9000, May 2021, | DOI 10.17487/RFC9000, May 2021, | |||
<https://www.rfc-editor.org/rfc/rfc9000>. | <https://www.rfc-editor.org/info/rfc9000>. | |||
[RFC9040] Touch, J., Welzl, M., and S. Islam, "TCP Control Block | [RFC9040] Touch, J., Welzl, M., and S. Islam, "TCP Control Block | |||
Interdependence", RFC 9040, DOI 10.17487/RFC9040, July | Interdependence", RFC 9040, DOI 10.17487/RFC9040, July | |||
2021, <https://www.rfc-editor.org/rfc/rfc9040>. | 2021, <https://www.rfc-editor.org/info/rfc9040>. | |||
[RFC9460] Schwartz, B., Bishop, M., and E. Nygren, "Service Binding | ||||
and Parameter Specification via the DNS (SVCB and HTTPS | ||||
Resource Records)", RFC 9460, DOI 10.17487/RFC9460, | ||||
November 2023, <https://www.rfc-editor.org/info/rfc9460>. | ||||
[TCP-COUPLING] | [TCP-COUPLING] | |||
"ctrlTCP: Reducing Latency through Coupled, Heterogeneous | Islam, S., Welzl, M., Hiorth, K., Hayes, D., Armitage, G., | |||
Multi-Flow TCP Congestion Control", IEEE INFOCOM Global | and S. Gjessing, "ctrlTCP: Reducing latency through | |||
Internet Symposium (GI) workshop (GI 2018) , n.d.. | coupled, heterogeneous multi-flow TCP congestion control", | |||
IEEE INFOCOM 2018 - IEEE Conference on Computer | ||||
Communications Workshops (INFOCOM WKSHPS), | ||||
DOI 10.1109/INFCOMW.2018.8406887, 2018, | ||||
<https://ieeexplore.ieee.org/document/8406887>. | ||||
Appendix A. API Mapping Template | Appendix A. API Mapping Template | |||
Any protocol mapping for the Transport Services API should follow a | Any protocol mapping for the Transport Services API should follow a | |||
common template. | common template. | |||
Connectedness: (Connectionless/Connected/Multiplexing Connected) | Connectedness: (Connectionless/Connected/Multiplexing Connected) | |||
Data Unit: (Byte-stream/Datagram/Message) | Data Unit: (Byte-stream/Datagram/Message) | |||
skipping to change at page 52, line 15 ¶ | skipping to change at line 2389 ¶ | |||
Receive: | Receive: | |||
Close: | Close: | |||
Abort: | Abort: | |||
CloseGroup: | CloseGroup: | |||
AbortGroup: | AbortGroup: | |||
Appendix B. Reasons for errors | Appendix B. Reasons for Errors | |||
The Transport Services API [I-D.ietf-taps-interface] allows for the | The Transport Services API [RFC9622] allows for several generic error | |||
several generic error types to specify a more detailed reason about | types to specify a more detailed reason about why an error occurred. | |||
why an error occurred. This appendix lists some of the possible | This appendix lists some of the possible reasons. | |||
reasons. | ||||
* InvalidConfiguration: The transport properties and Endpoint | InvalidConfiguration: The transport properties and Endpoint | |||
Identifers provided by the application are either contradictory or | Identifiers provided by the application are either contradictory | |||
incomplete. Examples include the lack of a Remote Endpoint | or incomplete. Examples include the lack of a Remote Endpoint | |||
Identifer on an active open or using a multicast group address | Identifier on an active open or using a multicast group address | |||
while not requesting a unidirectional receive. | while not requesting a unidirectional receive. | |||
* NoCandidates: The configuration is valid, but none of the | NoCandidates: The configuration is valid, but none of the available | |||
available transport protocols can satisfy the transport properties | transport protocols can satisfy the transport properties provided | |||
provided by the application. | by the application. | |||
* ResolutionFailed: The remote or local specifier provided by the | ResolutionFailed: The remote or local specifier provided by the | |||
application can not be resolved. | application cannot be resolved. | |||
* EstablishmentFailed: The Transport Services system was unable to | EstablishmentFailed: The Transport Services system was unable to | |||
establish a transport-layer connection to the Remote Endpoint | establish a transport-layer connection to the Remote Endpoint | |||
specified by the application. | specified by the application. | |||
* PolicyProhibited: The system policy prevents the Transport | PolicyProhibited: The system policy prevents the Transport Services | |||
Services system from performing the action requested by the | system from performing the action requested by the application. | |||
application. | ||||
* NotCloneable: The Protocol Stack is not capable of being cloned. | NotCloneable: The Protocol Stack is not capable of being cloned. | |||
* MessageTooLarge: The Message is too big for the Transport Services | MessageTooLarge: The Message is too big for the Transport Services | |||
system to handle. | system to handle. | |||
* ProtocolFailed: The underlying Protocol Stack failed. | ProtocolFailed: The underlying Protocol Stack failed. | |||
* InvalidMessageProperties: The Message Properties either contradict | InvalidMessageProperties: The Message Properties either contradict | |||
the Transport Properties or they can not be satisfied by the | the Transport Properties or cannot be satisfied by the Transport | |||
Transport Services system. | Services system. | |||
* DeframingFailed: The data that was received by the underlying | DeframingFailed: The data that was received by the underlying | |||
Protocol Stack could not be processed by the Message Framer. | Protocol Stack could not be processed by the Message Framer. | |||
* ConnectionAborted: The connection was aborted by the peer. | ConnectionAborted: The connection was aborted by the peer. | |||
* Timeout: Delivery of a Message was not possible after a timeout. | Timeout: Delivery of a Message was not possible after a timeout. | |||
Appendix C. Existing Implementations | Appendix C. Existing Implementations | |||
This appendix gives an overview of existing implementations, at the | This appendix gives an overview of existing implementations, at the | |||
time of writing, of Transport Services systems that are (to some | time of writing, of Transport Services systems that are (to some | |||
degree) in line with this document. | degree) in line with this document. | |||
* Apple's Network.framework: | * Apple's Network.framework: | |||
- Network.framework is a transport-level API built for C, | - Network.framework is a transport-level API built for C, | |||
Objective-C, and Swift. It a connect-by-name API that supports | Objective-C, and Swift. It is a connect-by-name API that | |||
transport security protocols. It provides userspace | supports transport security protocols. It provides user-space | |||
implementations of TCP, UDP, TLS, DTLS, proxy protocols, and | implementations of TCP, UDP, TLS, DTLS, and proxy protocols, | |||
allows extension via custom framers. | and it allows extension via custom framers. | |||
- Documentation: https://developer.apple.com/documentation/ | - Documentation: https://developer.apple.com/documentation/ | |||
network (https://developer.apple.com/documentation/network) | network | |||
* NEAT and NEATPy: | * NEAT and NEATPy: | |||
- NEAT is the output of the European H2020 research project | - NEAT is the output of the European H2020 research project | |||
"NEAT"; it is a user-space library for protocol-independent | "NEAT"; it is a user-space library for protocol-independent | |||
communication on top of TCP, UDP and SCTP, with many more | communication on top of TCP, UDP, and SCTP, with many more | |||
features, such as a policy manager. | features, such as a policy manager. | |||
- Code: https://github.com/NEAT-project/neat (https://github.com/ | - Code: https://github.com/NEAT-project/neat | |||
NEAT-project/neat) | ||||
- Code at the Software Heritage Archive: | - Code at the Software Heritage Archive: | |||
https://archive.softwareheritage.org/swh:1:dir:737820840f83c4ec | https://archive.softwareheritage.org/swh:1:dir:737820840f83c4ec | |||
9493a8c0cc89b3159e2e1a57;origin=https://github.com/NEAT- | 9493a8c0cc89b3159e2e1a57;origin=https://github.com/NEAT- | |||
project/neat;visit=swh:1:snp:bbb611b04e355439d47e426e8ad5d07cdb | project/neat;visit=swh:1:snp:bbb611b04e355439d47e426e8ad5d07cdb | |||
f647e0;anchor=swh:1:rev:652ee991043ce3560a6e5715fa2a5c211139d15 | f647e0;anchor=swh:1:rev:652ee991043ce3560a6e5715fa2a5c211139d15 | |||
c (https://archive.softwareheritage.org/swh:1:dir:737820840f83c | c | |||
4ec9493a8c0cc89b3159e2e1a57;origin=https://github.com/NEAT- | ||||
project/neat;visit=swh:1:snp:bbb611b04e355439d47e426e8ad5d07cdb | ||||
f647e0;anchor=swh:1:rev:652ee991043ce3560a6e5715fa2a5c211139d15 | ||||
c) | ||||
- NEAT project: https://www.neat-project.org (https://www.neat- | - NEAT project: https://www.neat-project.org | |||
project.org) | ||||
- NEATPy is a Python shim over NEAT which updates the NEAT API to | - NEATPy is a Python shim over NEAT that updates the NEAT API to | |||
be in line with version 6 of the Transport Services API draft. | be in line with version 6 of the Transport Services API | |||
[RFC9622]. | ||||
- Code: https://github.com/theagilepadawan/NEATPy | - Code: https://github.com/theagilepadawan/NEATPy | |||
(https://github.com/theagilepadawan/NEATPy) | ||||
- Code at the Software Heritage Archive: | - Code at the Software Heritage Archive: | |||
https://archive.softwareheritage.org/swh:1:dir:295ccd148cf918cc | https://archive.softwareheritage.org/swh:1:dir:295ccd148cf918cc | |||
b9ed7ad14b5ae968a8d2c370;origin=https://github.com/ | b9ed7ad14b5ae968a8d2c370;origin=https://github.com/ | |||
theagilepadawan/NEATPy;visit=swh:1:snp:6e1a3a9dd4c532ba6c0f52c8 | theagilepadawan/NEATPy;visit=swh:1:snp:6e1a3a9dd4c532ba6c0f52c8 | |||
f734c1256a06cedc;anchor=swh:1:rev:cd0788d7f7f34a0e9b8654516da7c | f734c1256a06cedc;anchor=swh:1:rev:cd0788d7f7f34a0e9b8654516da7c | |||
002c44d2e95 (https://archive.softwareheritage.org/swh:1:dir:295 | 002c44d2e95 | |||
ccd148cf918ccb9ed7ad14b5ae968a8d2c370;origin=https://github.com | ||||
/theagilepadawan/NEATPy;visit=swh:1:snp:6e1a3a9dd4c532ba6c0f52c | ||||
8f734c1256a06cedc;anchor=swh:1:rev:cd0788d7f7f34a0e9b8654516da7 | ||||
c002c44d2e95) | ||||
* PyTAPS: | * PyTAPS: | |||
- A TAPS implementation based on Python asyncio, offering | - A Transport Services (TAPS) implementation based on Python | |||
protocol-independent communication to applications on top of | asyncio, offering protocol-independent communication to | |||
TCP, UDP and TLS, with support for multicast. | applications on top of TCP, UDP, and TLS, with support for | |||
multicast. | ||||
- Code: https://github.com/fg-inet/python-asyncio-taps | - Code: https://github.com/fg-inet/python-asyncio-taps | |||
(https://github.com/fg-inet/python-asyncio-taps) | ||||
- Code at the Software Heritage Archive: | - Code at the Software Heritage Archive: | |||
https://archive.softwareheritage.org/swh:1:dir:a7151096d91352b4 | https://archive.softwareheritage.org/swh:1:dir:a7151096d91352b4 | |||
39b092ef116d04f38e52e556;origin=https://github.com/fg-inet/ | 39b092ef116d04f38e52e556;origin=https://github.com/fg-inet/ | |||
python-asyncio-taps;visit=swh:1:snp:4841e59b53b28bb385726e7d3a5 | python-asyncio-taps;visit=swh:1:snp:4841e59b53b28bb385726e7d3a5 | |||
69bee0fea7fc4;anchor=swh:1:rev:63571fd7545da25142bc1a6371b8f130 | 69bee0fea7fc4;anchor=swh:1:rev:63571fd7545da25142bc1a6371b8f130 | |||
97cba38e (https://archive.softwareheritage.org/swh:1:dir:a71510 | 97cba38e | |||
96d91352b439b092ef116d04f38e52e556;origin=https://github.com/ | ||||
fg-inet/python-asyncio-taps;visit=swh:1:snp:4841e59b53b28bb3857 | Acknowledgements | |||
26e7d3a569bee0fea7fc4;anchor=swh:1:rev:63571fd7545da25142bc1a63 | ||||
71b8f13097cba38e) | This work has received funding from the European Union's Horizon 2020 | |||
research and innovation programme under grant agreement No. 644334 | ||||
(NEAT) and No. 815178 (5GENESIS). | ||||
This work has been supported by: | ||||
* Leibniz Prize project funds from the DFG - German Research | ||||
Foundation: Gottfried Wilhelm Leibniz-Preis 2011 (FKZ FE 570/4-1). | ||||
* the UK Engineering and Physical Sciences Research Council under | ||||
grant EP/R04144X/1. | ||||
* the Research Council of Norway under its "Toppforsk" programme | ||||
through the "OCARINA" project. | ||||
Thanks to Colin S. Perkins, Tom Jones, Karl-Johan Grinnemo, and Gorry | ||||
Fairhurst for their contributions to the design of this | ||||
specification. Thanks also to Stuart Cheshire, Josh Graessley, David | ||||
Schinazi, and Eric Kinnear for their implementation and design | ||||
efforts, including Happy Eyeballs, that heavily influenced this work. | ||||
Authors' Addresses | Authors' Addresses | |||
Anna Brunstrom (editor) | Anna Brunstrom (editor) | |||
Karlstad University | Karlstad University | |||
Universitetsgatan 2 | Universitetsgatan 2 | |||
651 88 Karlstad | 651 88 Karlstad | |||
Sweden | Sweden | |||
Email: anna.brunstrom@kau.se | Email: anna.brunstrom@kau.se | |||
Tommy Pauly (editor) | Tommy Pauly (editor) | |||
Apple Inc. | Apple Inc. | |||
One Apple Park Way | One Apple Park Way | |||
Cupertino, California 95014, | Cupertino, CA 95014 | |||
United States of America | United States of America | |||
Email: tpauly@apple.com | Email: tpauly@apple.com | |||
Reese Enghardt | Reese Enghardt | |||
Netflix | Netflix | |||
121 Albright Way | 121 Albright Way | |||
Los Gatos, CA 95032, | Los Gatos, California 95032 | |||
United States of America | United States of America | |||
Email: ietf@tenghardt.net | Email: ietf@tenghardt.net | |||
Philipp S. Tiesel | Philipp S. Tiesel | |||
SAP SE | SAP SE | |||
George-Stephenson-Straße 7-13 | George-Stephenson-Str. 7-13 | |||
10557 Berlin | 10557 Berlin | |||
Germany | Germany | |||
Email: philipp@tiesel.net | Email: philipp@tiesel.net | |||
Michael Welzl | Michael Welzl | |||
University of Oslo | University of Oslo | |||
PO Box 1080 Blindern | PO Box 1080 Blindern | |||
0316 Oslo | 0316 Oslo | |||
Norway | Norway | |||
Email: michawe@ifi.uio.no | Email: michawe@ifi.uio.no | |||
End of changes. 293 change blocks. | ||||
776 lines changed or deleted | 765 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. |